Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
appdata -MpSvc.dll

Overview

General Information

Sample name:appdata -MpSvc.dll
Analysis ID:1405581
MD5:504356291f6139c3400cdd7842bc1406
SHA1:eaae969b5db3779fbb9a1bba694468b003822c77
SHA256:34a5017f3894d9d403fd2c5baa03d7bb6b9c28afb74e36010310af8f601602fb
Tags:bankerdll
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Found evasive API chain checking for user administrative privileges
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3660 cmdline: loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2356 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 1336 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 3796 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 1012 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6788 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 2168 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6836 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 2644 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6836 -s 2140 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7000 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4440 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 4044 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 684 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 5348 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 6992 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 684 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 2404 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: appdata -MpSvc.dllAvira: detected
Source: appdata -MpSvc.dllReversingLabs: Detection: 47%
Source: appdata -MpSvc.dllJoe Sandbox ML: detected
Source: appdata -MpSvc.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: unknownHTTPS traffic detected: 3.5.233.174:443 -> 192.168.2.6:49717 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B4E5A4 FindFirstFileW,FindClose,5_2_00B4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,5_2_00B4DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0426E5A4 FindFirstFileW,FindClose,11_2_0426E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0426DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,11_2_0426DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0040E5A4 FindFirstFileW,FindClose,12_2_0040E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0040DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,12_2_0040DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0040E5A4 FindFirstFileW,FindClose,13_2_0040E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0040DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_0040DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0446E5A4 FindFirstFileW,FindClose,14_2_0446E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0446DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,14_2_0446DFD8

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 3.5.233.174 443Jump to behavior
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /webPc.zip HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awsserver903203232.s3.sa-east-1.amazonaws.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_044A5DCC Sleep,URLDownloadToFileW,Sleep,11_2_044A5DCC
Source: global trafficHTTP traffic detected: GET /webPc.zip HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awsserver903203232.s3.sa-east-1.amazonaws.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: awsserver903203232.s3.sa-east-1.amazonaws.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundx-amz-request-id: JQ346M807WVPWYMHx-amz-id-2: ubI19FHlsDANi844u/osa9nS0voFgAhnlpZkMXatCQY+d7AXA0hWTnpaTCetmm4Ks7R6rUzJcgPtz154jSO2GQ1ODHJiSjvEContent-Type: application/xmlTransfer-Encoding: chunkedDate: Fri, 08 Mar 2024 18:43:14 GMTServer: AmazonS3Connection: close
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: rundll32.exeString found in binary or memory: http://www.delphiforfun.org/
Source: rundll32.exe, 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, appdata -MpSvc.dllString found in binary or memory: http://www.delphiforfun.org/openU
Source: rundll32.exe, 0000000B.00000002.2285349012.00000000007C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/.
Source: rundll32.exe, 0000000B.00000002.2285349012.00000000007C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/r
Source: rundll32.exe, 0000000B.00000002.2285349012.0000000000792000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2285726482.0000000000C78000.00000004.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2285349012.00000000007E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip
Source: rundll32.exe, 0000000B.00000002.2285349012.000000000077F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip5pV
Source: rundll32.exe, 0000000B.00000002.2285349012.0000000000792000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipC
Source: rundll32.exe, 0000000B.00000002.2285349012.00000000007E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipx
Source: rundll32.exe, 0000000B.00000002.2285349012.00000000007C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownHTTPS traffic detected: 3.5.233.174:443 -> 192.168.2.6:49717 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B4CB045_2_00B4CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0438722011_2_04387220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04386F6011_2_04386F60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0426CB0411_2_0426CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0052722012_2_00527220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0040CB0412_2_0040CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_00526F6012_2_00526F60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0040CB0413_2_0040CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0446CB0414_2_0446CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0041144C appears 32 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0040D3A4 appears 32 times
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: appdata -MpSvc.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: classification engineClassification label: mal72.evad.winDLL@26/17@1/1
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Program Files (x86)\Microsoft.NET\baseJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1456:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4440
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1336
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6836
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5348
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2091f8dc-3b5d-4824-8d89-9a9b6d98f3edJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
Source: appdata -MpSvc.dllReversingLabs: Detection: 47%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 684
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 684
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6836 -s 2140
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheckJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationInterceptJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheckJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationInterceptJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapperJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow found: window name: TMainFormJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: appdata -MpSvc.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: appdata -MpSvc.dllStatic file information: File size 26239902 > 1048576
Source: appdata -MpSvc.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x24d400
Source: appdata -MpSvc.dllStatic PE information: More than 200 imports for user32.dll
Source: appdata -MpSvc.dllStatic PE information: section name: .didata
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B81198 push ecx; mov dword ptr [esp], eax5_2_00B81199
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00C152B4 push ecx; mov dword ptr [esp], edx5_2_00C152B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B65A38 push ecx; mov dword ptr [esp], ecx5_2_00B65A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B51270 push 00B512F3h; ret 5_2_00B512EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50BA0 push ecx; mov dword ptr [esp], edx5_2_00B50BA1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50BC2 push ecx; mov dword ptr [esp], edx5_2_00B50BC5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50B34 push ecx; mov dword ptr [esp], edx5_2_00B50B35
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50B28 push ecx; mov dword ptr [esp], edx5_2_00B50B29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50B1C push ecx; mov dword ptr [esp], edx5_2_00B50B1D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50B7A push ecx; mov dword ptr [esp], edx5_2_00B50B7D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B47368 push ecx; mov dword ptr [esp], eax5_2_00B47369
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50CB4 push ecx; mov dword ptr [esp], edx5_2_00B50CB5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50CCC push ecx; mov dword ptr [esp], edx5_2_00B50CCD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B7E5B4 push ecx; mov dword ptr [esp], eax5_2_00B7E5B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50504 push ecx; mov dword ptr [esp], edx5_2_00B50505
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B66EF4 push ecx; mov dword ptr [esp], ecx5_2_00B66EF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04270504 push ecx; mov dword ptr [esp], edx11_2_04270505
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0429E5B4 push ecx; mov dword ptr [esp], eax11_2_0429E5B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0435D588 push ecx; mov dword ptr [esp], eax11_2_0435D58A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_042A1198 push ecx; mov dword ptr [esp], eax11_2_042A1199
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04271270 push 042712F3h; ret 11_2_042712EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0435D250 push ecx; mov dword ptr [esp], eax11_2_0435D254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_043352B4 push ecx; mov dword ptr [esp], edx11_2_043352B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04267368 push ecx; mov dword ptr [esp], eax11_2_04267369
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04270CB4 push ecx; mov dword ptr [esp], edx11_2_04270CB5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04270CCC push ecx; mov dword ptr [esp], edx11_2_04270CCD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04286EF4 push ecx; mov dword ptr [esp], ecx11_2_04286EF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04286F30 push ecx; mov dword ptr [esp], ecx11_2_04286F34
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_044A58E8 push 044A592Eh; ret 11_2_044A5926
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04285A38 push ecx; mov dword ptr [esp], ecx11_2_04285A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_04270B28 push ecx; mov dword ptr [esp], edx11_2_04270B29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00D2A8FC IsIconic,5_2_00D2A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00D2A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,5_2_00D2A980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0444A8FC IsIconic,11_2_0444A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0444A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,11_2_0444A980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_005EA8FC IsIconic,12_2_005EA8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_005EA980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,12_2_005EA980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_005EA8FC IsIconic,13_2_005EA8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_005EA980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,13_2_005EA980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0464A8FC IsIconic,14_2_0464A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0464A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,14_2_0464A980
Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_11-11610
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 9.1 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B4E5A4 FindFirstFileW,FindClose,5_2_00B4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,5_2_00B4DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0426E5A4 FindFirstFileW,FindClose,11_2_0426E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_0426DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,11_2_0426DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0040E5A4 FindFirstFileW,FindClose,12_2_0040E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_0040DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,12_2_0040DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0040E5A4 FindFirstFileW,FindClose,13_2_0040E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0040DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_0040DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0446E5A4 FindFirstFileW,FindClose,14_2_0446E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0446DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,14_2_0446DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B502F4 GetSystemInfo,5_2_00B502F4
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: rundll32.exe, 0000000B.00000002.2285349012.0000000000792000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000B.00000002.2285349012.00000000007E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_5-9248
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_11-12761
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_12-12477
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_13-9368
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_14-9174
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 3.5.233.174 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 11_2_044A21C4 ShellExecuteW,11_2_044A21C4
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B48AC4 cpuid 5_2_00B48AC4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,5_2_00B4E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_00B4DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,11_2_0426E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_0426DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,12_2_0040E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_0040DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,13_2_0040E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_0040DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,14_2_0446E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_0446DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_00B50308 GetVersion,5_2_00B50308
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
Process Injection
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
111
Process Injection
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Rundll32
Cached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1405581 Sample: appdata -MpSvc.dll Startdate: 08/03/2024 Architecture: WINDOWS Score: 72 31 s3-r-w.sa-east-1.amazonaws.com 2->31 33 awsserver903203232.s3.sa-east-1.amazonaws.com 2->33 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 13 9->11         started        15 rundll32.exe 9->15         started        17 cmd.exe 1 9->17         started        19 7 other processes 9->19 dnsIp6 35 s3-r-w.sa-east-1.amazonaws.com 3.5.233.174, 443, 49717 AMAZON-02US United States 11->35 43 System process connects to network (likely due to code injection or exploit) 11->43 21 WerFault.exe 11->21         started        45 Found evasive API chain checking for user administrative privileges 15->45 23 rundll32.exe 17->23         started        25 WerFault.exe 16 19->25         started        27 WerFault.exe 2 16 19->27         started        signatures7 process8 process9 29 WerFault.exe 23 16 23->29         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
appdata -MpSvc.dll47%ReversingLabsWin32.Trojan.Generic
appdata -MpSvc.dll100%AviraHEUR/AGEN.1338333
appdata -MpSvc.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s3-r-w.sa-east-1.amazonaws.com
3.5.233.174
truefalse
    high
    awsserver903203232.s3.sa-east-1.amazonaws.com
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://awsserver903203232.s3.sa-east-1.amazonaws.com/rrundll32.exe, 0000000B.00000002.2285349012.00000000007C9000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://upx.sf.netAmcache.hve.8.drfalse
            high
            https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip5pVrundll32.exe, 0000000B.00000002.2285349012.000000000077F000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://www.delphiforfun.org/openUrundll32.exe, 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, appdata -MpSvc.dllfalse
                high
                https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipxrundll32.exe, 0000000B.00000002.2285349012.00000000007E0000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.delphiforfun.org/rundll32.exefalse
                    high
                    https://awsserver903203232.s3.sa-east-1.amazonaws.com/.rundll32.exe, 0000000B.00000002.2285349012.00000000007C9000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipCrundll32.exe, 0000000B.00000002.2285349012.0000000000792000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        3.5.233.174
                        s3-r-w.sa-east-1.amazonaws.comUnited States
                        16509AMAZON-02USfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1405581
                        Start date and time:2024-03-08 19:42:10 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 54s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:25
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:appdata -MpSvc.dll
                        Detection:MAL
                        Classification:mal72.evad.winDLL@26/17@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .dll
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.189.173.21
                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: appdata -MpSvc.dll
                        TimeTypeDescription
                        19:43:05API Interceptor4x Sleep call for process: WerFault.exe modified
                        19:43:10API Interceptor1x Sleep call for process: loaddll32.exe modified
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        s3-r-w.sa-east-1.amazonaws.com00023948209303294#U00ac320302282349843984903.exeGet hashmaliciousUnknownBrowse
                        • 3.5.232.137
                        00023948209303294#U00ac320302282349843984903.exeGet hashmaliciousUnknownBrowse
                        • 16.12.1.14
                        0219830219301290321012notas.exeGet hashmaliciousUnknownBrowse
                        • 3.5.232.21
                        0219830219301290321012notas.exeGet hashmaliciousUnknownBrowse
                        • 3.5.234.1
                        0923840932020004-3-0.exeGet hashmaliciousUnknownBrowse
                        • 3.5.232.185
                        WKYC506_2389030007-00901003007010_777380775_#U00b2.exeGet hashmaliciousUnknownBrowse
                        • 52.95.163.114
                        WKYC506_2389030007-00901003007010_777380775_#U00b2.exeGet hashmaliciousUnknownBrowse
                        • 16.12.0.34
                        DOC7186723912#U0370.msiGet hashmaliciousHidden Macro 4.0Browse
                        • 52.95.164.60
                        DOC0974045396#U0370.msiGet hashmaliciousHidden Macro 4.0Browse
                        • 52.95.164.98
                        file.msiGet hashmaliciousHidden Macro 4.0Browse
                        • 52.95.164.11
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        AMAZON-02USsaoJLnjLcC.elfGet hashmaliciousUnknownBrowse
                        • 34.249.145.219
                        ZAYIMfNGS6.elfGet hashmaliciousUnknownBrowse
                        • 34.249.145.219
                        j9JVfEt8Il.elfGet hashmaliciousUnknownBrowse
                        • 34.254.182.186
                        http://mydpd.space/Get hashmaliciousDCRat, PureLog StealerBrowse
                        • 99.84.203.3
                        https://www.hiclipart.com/free-transparent-background-png-clipart-zjdjz/downloadGet hashmaliciousUnknownBrowse
                        • 13.226.225.59
                        http://67833.vipGet hashmaliciousPhisherBrowse
                        • 18.244.214.32
                        FW Attention New Incoming D0CS for Live-quinn on.emlGet hashmaliciousHTMLPhisherBrowse
                        • 52.43.182.179
                        https://www.trade-schools-directory.com/redir/coquredir.htm?page=college&type=popular&pos=82&dest=//gamma.app/public/This-project-proposal-aims-to-address-the-challenges-and-deliver--4tlhyfwlb1pvqx4Get hashmaliciousUnknownBrowse
                        • 3.132.246.63
                        https://www.trade-schools-directory.com/redir/coquredir.htm?page=college&type=popular&pos=82&dest=//gamma.app/public/This-project-proposal-aims-to-address-the-challenges-and-deliver--4tlhyfwlb1pvqx4Get hashmaliciousUnknownBrowse
                        • 13.226.210.22
                        https://cosoc.com/generatorsystemsGet hashmaliciousUnknownBrowse
                        • 18.154.132.63
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        37f463bf4616ecd445d4a1937da06e19http://mydpd.space/Get hashmaliciousDCRat, PureLog StealerBrowse
                        • 3.5.233.174
                        https://www.hiclipart.com/free-transparent-background-png-clipart-zjdjz/downloadGet hashmaliciousUnknownBrowse
                        • 3.5.233.174
                        Kontrolforanstaltningens31.wsfGet hashmaliciousGuLoader, XWormBrowse
                        • 3.5.233.174
                        file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                        • 3.5.233.174
                        SecuriteInfo.com.Win32.PWSX-gen.10639.26376.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.5.233.174
                        20240306 The new order about PO#PW225084YL.50L of 23AW1203A285 2ND SAMPLE ENR xls.bat.exeGet hashmaliciousGuLoaderBrowse
                        • 3.5.233.174
                        Re Remittance Advice.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.5.233.174
                        PO 02-2311-55R-MAP- 7Mar2024-19th Order-Euro38217- URGENT ORDER solutions -RK.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.5.233.174
                        SecuriteInfo.com.Unwanted-Program.0056626f1.515.26855.exeGet hashmaliciousUnknownBrowse
                        • 3.5.233.174
                        SecuriteInfo.com.Win32.PWSX-gen.6931.14638.exeGet hashmaliciousAgentTeslaBrowse
                        • 3.5.233.174
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):1.1525405310603927
                        Encrypted:false
                        SSDEEP:192:wainOtgb0BU/wjeT9IkA3fzuiFcZ24IO8dci:JiOtgoBU/wjeSfzuiFcY4IO8dci
                        MD5:44904A3EC34D9E2A2A129CDF3AAE4AE4
                        SHA1:3B3A6A89F4DB8DAF0BED4FCC55A4F2248B2A2F1F
                        SHA-256:4DAFF3DADDBCFDFF66039AE47759B87CB52EB39CBFA34FDF110066FE16938FA1
                        SHA-512:97ACECB0D79BC9D4A4F05F2CF9FE8A130E71A04C7C23D469DA381D0A4BE5E8B32DA15374BE489D2D2BFE59125D746564D431A435EEF9C7CDB57618DDA845557D
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.4.8.5.3.2.5.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.8.0.0.9.5.1.0.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.7.4.4.c.c.e.-.c.1.f.8.-.4.2.1.9.-.a.5.1.8.-.c.8.f.d.2.8.4.9.0.9.1.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.4.0.1.9.e.4.-.b.7.a.3.-.4.c.b.9.-.a.c.4.d.-.0.d.a.d.5.1.a.7.c.b.2.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.b.4.-.0.0.0.1.-.0.0.1.5.-.8.8.f.1.-.1.8.7.8.8.8.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9170958825611729
                        Encrypted:false
                        SSDEEP:192:hAoLiSOrKL20BU/wjeTdIwzuiFtZ24IO84ci:TLizGLdBU/wjeLzuiFtY4IO84ci
                        MD5:A765B1B78AF0690279A30E7D48E02E81
                        SHA1:28BC4BF38978D44D04C935811C5E48C0BC89B129
                        SHA-256:2575D77250348AF1F83643DC2AF31D03A6A0328A74A417A95D6A80A2C2618272
                        SHA-512:BF73BE51342711A0DCB4CF59597EEC123AB37CCE3273F9C4B888A02CE1177E564C75556C447462A40C3FCCF748306D5F088147FCB0115BA4AA666108387E472F
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.1.4.7.4.1.4.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.2.3.9.6.0.2.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.b.b.a.b.8.c.-.3.e.d.c.-.4.e.3.d.-.b.7.d.7.-.c.9.8.4.a.7.7.8.d.0.2.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.e.4.5.1.1.4.4.-.0.b.3.1.-.4.a.7.9.-.8.6.9.1.-.e.6.1.c.3.e.e.1.a.e.c.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.e.4.-.0.0.0.1.-.0.0.1.5.-.9.e.f.a.-.3.1.7.8.8.8.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9172594172316787
                        Encrypted:false
                        SSDEEP:192:NjHGi2OcL20BU/wjeTdDBzuiFtZ24IO84ci:NjGi3cLdBU/wjezzuiFtY4IO84ci
                        MD5:28878CD6540D2150442D58F010887523
                        SHA1:22C87F64BB0E01FF4F87183FF932F76A6493A96C
                        SHA-256:C194F7FB546E30C9363CB46BC98F20C12CDF3D505F4F3A0337EF91ECDB9AEEFD
                        SHA-512:343D51A17D3D011FFE071137253ADE39BEB4E6365741E96B2F322D5F6A3291F03357F8D3B6E222BA79C9F33744B7C9DDF4FEA8C5A4CDDD1496FA6B01AEF50401
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.6.9.8.2.0.2.9.3.6.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.6.9.8.2.8.5.7.4.9.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.6.9.3.1.5.0.9.-.3.2.b.6.-.4.1.2.4.-.8.7.9.e.-.5.6.1.2.6.e.9.e.c.3.c.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.f.a.5.2.7.2.7.-.3.2.f.6.-.4.0.a.b.-.b.0.7.5.-.b.1.c.1.7.e.8.9.0.7.c.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.3.8.-.0.0.0.1.-.0.0.1.5.-.3.6.4.2.-.a.7.7.2.8.8.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9119464709949463
                        Encrypted:false
                        SSDEEP:192:IhirOIZw0BU/wjeTdIwzuiFtZ24IO8dci:aiy+LBU/wjeLzuiFtY4IO8dci
                        MD5:FDC794FF6E77D0958FF93C270E35C035
                        SHA1:C43FC3FDDCD46A7F5E45F5272B5C8374D033AB61
                        SHA-256:08C6DC577BBBEA30DCA38D0060AEB26402F5CAD617545E17E8F26B7F888BFDE7
                        SHA-512:35A06335C36B51CC0C7B2F59B345389EE8435BAD2BB11171D58125A498218656D54F5F1AEBA6448E4D508A90E5A7A432C187053E0958017F833383E89777BE74
                        Malicious:false
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.1.5.7.5.4.8.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.6.9.9.2.4.8.1.7.2.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.5.f.5.f.9.1.0.-.6.0.a.a.-.4.d.1.2.-.9.b.4.d.-.3.a.f.6.e.8.e.9.0.2.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.4.c.0.7.f.4.-.3.5.9.2.-.4.a.7.a.-.9.0.c.6.-.9.8.e.d.2.7.c.6.b.5.c.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.1.5.8.-.0.0.0.1.-.0.0.1.5.-.f.d.6.7.-.2.8.7.8.8.8.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:43:02 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):52848
                        Entropy (8bit):1.7884544586418907
                        Encrypted:false
                        SSDEEP:192:wJBL07WXAMO5H4kfNbQWJ4TDrI2twWeg2CR:TRD5HBJ4Txt3R
                        MD5:F8CDE89B3821E8ACBD416AA063D05018
                        SHA1:C1EC0F0BCA123E8DFE76139F95F51CAE0FE6D9E8
                        SHA-256:8BF50EA868CB2FF7D01AC3E60961971596EEB9B759240CF2F066C41A495AA17E
                        SHA-512:6BE95E159820ACF6233CF03496E2578C0C0E7A352D3E59F5C88499EAF4D14557610815EACD1D308492102029D3A525EA58BD21BAECA7EA9FCC739C4142141A23
                        Malicious:false
                        Preview:MDMP..a..... .......6\.e........................(...............4/..........T.......8...........T......................................................................................................................eJ......x.......GenuineIntel............T.......8...5\.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8340
                        Entropy (8bit):3.6884924087717716
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJSD6RL6YR863gmf8Ao5N5prp89bZjsf8sTm:R6lXJm6N6Yq63gmf8AoOZIf81
                        MD5:7FE4C794B3F4C79F4D016EF9D6B0AB05
                        SHA1:579F15AE7ECC5AFE1535A5A9720EAF3EC6CF05AB
                        SHA-256:B887883D89B3F659BD3C54911425FDA1CBF247AFCC7A3FE5F1E3B134336FE2A4
                        SHA-512:46F34AC1CD52733DDBBC388BA37E5663CE885C3B5C86F3F7984BF4A34B81ED79029086CDA5F11225F0FF9A71CB9E073A3912D98190DDA0BEFB97968F3EF7F1E4
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.3.6.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4759
                        Entropy (8bit):4.447713654394558
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zszJg77aI9m5WpW8VYEYm8M4JCdPvdFJ+q8vjPvvUGScSxd:uIjfNI7II7V4JGKbUJ3xd
                        MD5:01984F2030F046B0BCE69144A37244E2
                        SHA1:1826BA609A6B10A66620941FE2A48102397129AD
                        SHA-256:98BDA81E68CE0D00B14B63F78B5559C93144471A7E5275B33851842E8BC3F88B
                        SHA-512:3AA688D454A89860921C7AB70CB9810AEFE68AA95A0BFD06EA50757FED006FD2E26E340CAB57E5F836C6533A9B7847D2A996033F287C0831DB2B3D65A12D5D68
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:43:11 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):44736
                        Entropy (8bit):1.927349339650594
                        Encrypted:false
                        SSDEEP:192:p6l3rM2XLcmO5H4h2P4Pk2bzpqOCZ02dHP:0Qx5HS2P41bzpqOroP
                        MD5:5267AC0CD751E00DF4665F5649F59BBC
                        SHA1:DB666B2F6D66D21C855AA4C7B1FA2FB425A5E55B
                        SHA-256:78128F1F2C75417CA0A0D2BF67722DA436569F1EEFE5B06C62CEEC682B1581EE
                        SHA-512:DF48ADF3C12A821AE6EE67838CB194425E922A671D0C45695E80E25B78A3D9C221E384D86C674C60C591CAA9F57AFAE6C62C5EA600A8D1501C5CCF6E51418752
                        Malicious:false
                        Preview:MDMP..a..... .......?\.e........................(...............8,..........T.......8...........T...........@...........................................................................................................eJ......H.......GenuineIntel............T...........>\.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:43:11 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):44968
                        Entropy (8bit):1.9974612778664782
                        Encrypted:false
                        SSDEEP:96:5I86jE3dtV+hqwXwO3Q2d8SkR0jdpXfRLYoi75I4v4O8djuq2AWaa4tsJSgrKVk2:p6OtV3rHcXjO5H4vM0XvHic6y
                        MD5:C7A49DC52BA7F1504F111C1617134E6C
                        SHA1:496A24147ED46CEDEB5B4BD74729F2DE848A6BE1
                        SHA-256:FDB1ECAA8624BCD24570C3DB9679DBF93680DCA3B42DA0C41D8BA7B0C0BECF82
                        SHA-512:A590D1088C289F25E78AF8AF96CC6A3A02D846A66D1CFD43A1D556CD7735F482DC81B4D09395BF4D209426C1A20523661E9EA752CFE2678D70917627596FE559
                        Malicious:false
                        Preview:MDMP..a..... .......?\.e........................(...........$...8,..........T.......8...........T...........@...h.......................................................................................................eJ......H.......GenuineIntel............T.......X...>\.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8342
                        Entropy (8bit):3.688467563313183
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJvC6x6Y5Qt6ggmf8Ao5N5prd89bj3sfcBm:R6lXJK6x6Yqt6ggmf8AoSj8fH
                        MD5:F04EA33EBEDF1FE2E3B4262B6AE63496
                        SHA1:4872151BAFC3F7B2022E089444372672CC482C6B
                        SHA-256:88C71A371A4104C71E026836AFAA8CCA033DFF1172B7C1D04969038F95085CD8
                        SHA-512:7C625EB54E53854235064D7D2A0822DE39A8EEB137F4CE49F05E26A0368B160A8987FE4CA84CFBB18DEB089CC1D0F263E7FDE1E684CF30EFDDD6B28D8A851FEC
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.4.8.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4759
                        Entropy (8bit):4.445872756748884
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zszJg77aI9m5WpW8VYqYm8M4JCdPvdFV+q8vjPvmAUGScSwd:uIjfNI7II7VSJyKCAUJ3wd
                        MD5:354ACD7E02BE172CD431648F198482A9
                        SHA1:C5317E55CA134A2BDC81AF9142BB1A369804B36A
                        SHA-256:B7AE00E27320B3FE8ED6B01AD22742A383D08508421292B3D248082A2C2CE4E5
                        SHA-512:3903F1FB469F8AB733467FC0ACAD08320539AA165EC53621D12081A05B8695200321E32B8477419D1C7823FCB389A6B08F955232946F5CF4E6CEDF56ED8D21F8
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8278
                        Entropy (8bit):3.691456573595857
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJZl6sZF6Y5QG6ggmfTM5N5pr389bjqsfvBm:R6lXJ76sZF6YqG6ggmfTMAjJfU
                        MD5:5586BA8A4F4998473DEB266167433CFA
                        SHA1:79C3F3BBA25019D81E773627E5C81F4D1B6F5F1F
                        SHA-256:8C8961E231D8C12367411D53202E3773D7F4139D5E3FE26E53327DC609EAEB4F
                        SHA-512:1ED467946D763B8D8942B1A09AA213BFC80279E4BFCF226A20FB4B557F2DC956FE7E7ADD0FAD08B66AD7225D3F3951A2AB6DEC5697DE4C7D44FEA0DC18051C75
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.4.4.0.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4658
                        Entropy (8bit):4.4615215256590215
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zszJg77aI9m5WpW8VYk0Ym8M4JCdPvHF0+q8/ZT7gUGScSBd:uIjfNI7II7VLJ5kgUJ3Bd
                        MD5:3535875783414EEC19184BC31A4D3530
                        SHA1:A79EC858C613D3FF0EB4F0C9B7193A231E75F907
                        SHA-256:AA1933C8B874A7A86A0A2917908AFCA35D0C5E05951F7123B8CAD0E25BF412B6
                        SHA-512:2A45EEEEE1EAB35FE354B5CB8455DCA7014AD878BE7FF20B303494B47E4D1DF1E17EF4834CB857592848A36F7F5AB31BCACAD611AE95E7E589E52DD86E15964D
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:43:16 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):116664
                        Entropy (8bit):2.0301230657367295
                        Encrypted:false
                        SSDEEP:384:be89uXWNf5HrmhND3AOimkHVSXl2N811n2VedBFkMlI3cWc9Q1/iiPzD:bedX05rmbDBW40+j2VGkeGsibD
                        MD5:9B93CE390A274A24617D5C9B7D812B2B
                        SHA1:8DA51F6BD5B6D8E308FC581FB549A2DA639A448C
                        SHA-256:16270D079D611820A94F814F3409C8619576DA37A879238B3208F44B98CB4E70
                        SHA-512:B1F13D5CBBBF35DC50AB45A954FBE9EA27C135429F867FE3353FC9D975662E5F5278BBAA21BB8033FF5F0508E88543B4FA59F352C743BA94CFD416B67031FC28
                        Malicious:false
                        Preview:MDMP..a..... .......D\.e......................... ..............~S..........T.......8...........T............S...s..........l)..........X+..............................................................................eJ.......+......GenuineIntel............T...........>\.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8296
                        Entropy (8bit):3.6935590253180215
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJIzlA6w/gR6Y5e6ggmfT64c5N5prr89bMv0sfAkm:R6lXJIm6h6Yw6ggmfT64c0MvnfC
                        MD5:73A75ED752E72A33683C3CD12C512D0A
                        SHA1:15628AC253E62DC5799183B7A16A78D7387370AA
                        SHA-256:663F74325C64861B01521C6E06193A04758C556FF62C6C97933FD00F66B6216F
                        SHA-512:01A8A1A65613967AB2F1B2AB6093953C9D67F5B554FE3D92AE9147661C3E95DC98D1651BB6927C87E268B205FC68B57618D6359E87A7243D53A537E36CCBC58A
                        Malicious:false
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.3.6.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4666
                        Entropy (8bit):4.476457446273455
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zszJg77aI9m5WpW8VYnYm8M4JCdPJFG+q8/uc6UGScS4d:uIjfNI7II7VTJda6UJ34d
                        MD5:A72F6DB06FE2F4ABB549AB4B216742E0
                        SHA1:C5AFBFD4FAE31B96793B817B3624B94482CE6981
                        SHA-256:3D0CC1C50A8B0C4F50AA4028FC880553A9EB248209594511C3FE52337024BF2E
                        SHA-512:7162DCEB3AFA48595D8C831B20BE8874A3C1B6DC1A3CF8F656EF3F25F07DA44A4210E7F3725FF71DD2893A6146B7DE72A7587EBED65227A9D74D22A4A964002B
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226665" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.4693961863056355
                        Encrypted:false
                        SSDEEP:6144:szZfpi6ceLPx9skLmb0fYZWSP3aJG8nAgeiJRMMhA2zX4WABluuNFjDH5S:SZHtYZWOKnMM6bFpHj4
                        MD5:2D21D0E9904539DB33241911286F3304
                        SHA1:600B0AF69F2F63A685028CF01093A9F91E8D6620
                        SHA-256:6FAA8B5C2D67CC6D915B8F0502450F07E3675B0BB012126F151A3D413E096F5B
                        SHA-512:2A87A303D4B0FA9A358759F53D6080C5C23E3610AFF306730F0BEF6FF2C6DB080DC75EFFAA62271A53B40CCD2C2F19BAA6BFC14CA4A212A456BEBEA3E6302787
                        Malicious:false
                        Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...r.q.................................................................................................................................................................................................................................................................................................................................................F........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):1.0541805421345023
                        TrID:
                        • Win32 Dynamic Link Library (generic) (1002004/3) 95.46%
                        • Win32 EXE PECompact compressed (generic) (41571/9) 3.96%
                        • Win16/32 Executable Delphi generic (2074/23) 0.20%
                        • Generic Win/DOS Executable (2004/3) 0.19%
                        • DOS Executable Generic (2002/1) 0.19%
                        File name:appdata -MpSvc.dll
                        File size:26'239'902 bytes
                        MD5:504356291f6139c3400cdd7842bc1406
                        SHA1:eaae969b5db3779fbb9a1bba694468b003822c77
                        SHA256:34a5017f3894d9d403fd2c5baa03d7bb6b9c28afb74e36010310af8f601602fb
                        SHA512:260fa1552a7222b90707035c93899a281c996d0316f75946195c40710e60992f3555ad01fec03c45eb81710064d8947939a5e1c6e5f3cd617aa1374ba645bb19
                        SSDEEP:24576:cMVKcnCjOGVNZXkLkswbSZ+UJ2L4yE9Ivvo5nlgzNNqFBsS4ETlX/sTTz7GMLIrN:7Y2UnaJGEF6S40sTbGM0oTAiEwdwb
                        TLSH:9D476D23B684763AC07F1A395427A654993FB76235969DAF57F00C4CCF365802A3FA0B
                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                        Icon Hash:7ae282899bbab082
                        Entrypoint:0x650898
                        Entrypoint Section:.itext
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                        DLL Characteristics:
                        Time Stamp:0x65D69275 [Thu Feb 22 00:16:53 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:4c1f56b4c50db99105e4a3eba0452881
                        Instruction
                        push ebp
                        mov ebp, esp
                        add esp, FFFFFFC0h
                        mov eax, 00647210h
                        call 00007F32105EF9C5h
                        call 00007F32105E8A4Ch
                        lea eax, dword ptr [eax+00h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x2660000xd2.edata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2610000x3f00.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x29e0000xc800.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2680000x352e0.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x261bb40x9ac.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2650000xac6.didata
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x24d3100x24d40088c3eda7ab2c914c2a9c5a5264606dabunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .itext0x24f0000x18b00x1a00a0dbfab2a75d6871c6c2fd045fb0b7e2False0.5171274038461539data6.1638649467993485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x2510000x8eac0x90006bc1cd1916205358cb83ad1716ba5a53False0.5597059461805556data6.102741094473156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .bss0x25a0000x6d4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .idata0x2610000x3f000x40000b256511ccbf3690e4608b76222cb9d6False0.30609130859375data5.133668405694886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .didata0x2650000xac60xc005d7ace3d0cc4aba26eb6a03d4ed33b64False0.3277994791666667data3.924768163545641IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .edata0x2660000xd20x2007baa57fb3a575a2793f3eca6fe25464fFalse0.353515625data2.5812448053415076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rdata0x2670000x440x200c9f8bfa36b2dc5163b75d3196d251b45False0.15625data1.1660636886017055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x2680000x352e00x354006f0174c94dbdb677a8c35c4bea9ef968False0.561656396713615data6.7153508191439295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .rsrc0x29e0000xc8000xc800042c0351f4331fdf7d6d9f7df2537c05False0.2859765625data4.749895191517642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_CURSOR0x29ed740x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                        RT_CURSOR0x29eea80x134dataEnglishUnited States0.4642857142857143
                        RT_CURSOR0x29efdc0x134dataEnglishUnited States0.4805194805194805
                        RT_CURSOR0x29f1100x134dataEnglishUnited States0.38311688311688313
                        RT_CURSOR0x29f2440x134dataEnglishUnited States0.36038961038961037
                        RT_CURSOR0x29f3780x134dataEnglishUnited States0.4090909090909091
                        RT_CURSOR0x29f4ac0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                        RT_BITMAP0x29f5e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                        RT_BITMAP0x29f7b00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                        RT_BITMAP0x29f9940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                        RT_BITMAP0x29fb640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                        RT_BITMAP0x29fd340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                        RT_BITMAP0x29ff040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                        RT_BITMAP0x2a00d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                        RT_BITMAP0x2a02a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                        RT_BITMAP0x2a04740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                        RT_BITMAP0x2a06440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                        RT_BITMAP0x2a08140x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colorsEnglishUnited States0.5197368421052632
                        RT_BITMAP0x2a08ac0x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colorsEnglishUnited States0.506578947368421
                        RT_STRING0x2a09440xb08data0.2730169971671388
                        RT_STRING0x2a144c0x898data0.28863636363636364
                        RT_STRING0x2a1ce40x368data0.32798165137614677
                        RT_STRING0x2a204c0x434data0.40427509293680297
                        RT_STRING0x2a24800x1b0data0.5532407407407407
                        RT_STRING0x2a26300xccdata0.6666666666666666
                        RT_STRING0x2a26fc0x28cdata0.4294478527607362
                        RT_STRING0x2a29880x160data0.5454545454545454
                        RT_STRING0x2a2ae80x350data0.42806603773584906
                        RT_STRING0x2a2e380x414data0.3611111111111111
                        RT_STRING0x2a324c0x358data0.3820093457943925
                        RT_STRING0x2a35a40x4f8data0.3026729559748428
                        RT_STRING0x2a3a9c0x2c4data0.3375706214689266
                        RT_STRING0x2a3d600x3c0data0.428125
                        RT_STRING0x2a41200x434data0.3745353159851301
                        RT_STRING0x2a45540x4ccdata0.3713355048859935
                        RT_STRING0x2a4a200x454data0.3303249097472924
                        RT_STRING0x2a4e740x38cdata0.3535242290748899
                        RT_STRING0x2a52000x450data0.3858695652173913
                        RT_STRING0x2a56500x200data0.412109375
                        RT_STRING0x2a58500xc4data0.6428571428571429
                        RT_STRING0x2a59140x170data0.5597826086956522
                        RT_STRING0x2a5a840x334data0.41585365853658535
                        RT_STRING0x2a5db80x408data0.3168604651162791
                        RT_STRING0x2a61c00x38cdata0.3876651982378855
                        RT_STRING0x2a654c0x2b4data0.4263005780346821
                        RT_RCDATA0x2a68000x10data1.5
                        RT_RCDATA0x2a68100x74cdata0.5321199143468951
                        RT_RCDATA0x2a6f5c0x2dataEnglishUnited States5.0
                        RT_RCDATA0x2a6f600x122aDelphi compiled form 'TF_LicenseGen'0.37827956989247313
                        RT_RCDATA0x2a818c0xa6bDelphi compiled form 'TF_MatchMerge'0.44169478815148105
                        RT_RCDATA0x2a8bf80xa66Delphi compiled form 'TMainForm'0.4560480841472577
                        RT_RCDATA0x2a96600x981Delphi compiled form 'TRulesForm'0.5187011919441019
                        RT_RCDATA0x2a9fe40x363Delphi compiled form 'TStats'0.5686274509803921
                        RT_GROUP_CURSOR0x2aa3480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                        RT_GROUP_CURSOR0x2aa35c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                        RT_GROUP_CURSOR0x2aa3700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x2aa3840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x2aa3980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x2aa3ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_GROUP_CURSOR0x2aa3c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                        RT_VERSION0x2aa3d40x23cdataEnglishUnited States0.4493006993006993
                        DLLImport
                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                        user32.dllCharNextW, LoadStringW
                        kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
                        kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc, FreeLibrary
                        user32.dllSetClassLongW, GetClassLongW, SetWindowLongW, GetWindowLongW, CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DeferWindowPos, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, BeginDeferWindowPos, AdjustWindowRectEx, ActivateKeyboardLayout
                        gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStretchBltMode, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                        version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                        kernel32.dllWriteFile, WinExec, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, TryEnterCriticalSection, TerminateProcess, SystemTimeToFileTime, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OpenProcess, MulDiv, MoveFileW, MapViewOfFile, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVolumeInformationW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileMappingW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                        advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
                        kernel32.dllSleep
                        netapi32.dllNetApiBufferFree, NetWkstaGetInfo
                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                        oleaut32.dllGetErrorInfo, SysFreeString
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
                        comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                        user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                        msvcrt.dllmemset, memcpy
                        shell32.dllShellExecuteExW, ShellExecuteW, Shell_NotifyIconW
                        URLMON.DLLURLDownloadToFileW
                        comdlg32.dllGetSaveFileNameW, GetOpenFileNameW
                        winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
                        winspool.drvGetDefaultPrinterW
                        kernel32.dllMulDiv
                        shell32.dllIsUserAnAdmin
                        NameOrdinalAddress
                        HackCheck50x647184
                        ServiceCrtMain40x647184
                        TMethodImplementationIntercept30x4662f8
                        __dbk_fcall_wrapper20x41188c
                        dbkFCallWrapperAddr10x65d634
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 8, 2024 19:43:13.666182995 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:13.666239023 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:13.666318893 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:13.707381964 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:13.707444906 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:14.689378023 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:14.689481020 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:14.812664032 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:14.812828064 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:14.814338923 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:14.814409971 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:14.822340965 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:14.868237019 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:15.150656939 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:15.150744915 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:15.150778055 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:15.150815010 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:15.150870085 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:15.152898073 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:15.152918100 CET443497173.5.233.174192.168.2.6
                        Mar 8, 2024 19:43:15.152939081 CET49717443192.168.2.63.5.233.174
                        Mar 8, 2024 19:43:15.152976990 CET49717443192.168.2.63.5.233.174
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 8, 2024 19:43:13.482597113 CET5378653192.168.2.61.1.1.1
                        Mar 8, 2024 19:43:13.653276920 CET53537861.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 8, 2024 19:43:13.482597113 CET192.168.2.61.1.1.10x6164Standard query (0)awsserver903203232.s3.sa-east-1.amazonaws.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)awsserver903203232.s3.sa-east-1.amazonaws.coms3-r-w.sa-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com3.5.233.174A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com3.5.233.147A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com52.95.165.75A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com3.5.233.149A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com16.12.2.6A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com3.5.232.106A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com3.5.234.180A (IP address)IN (0x0001)false
                        Mar 8, 2024 19:43:13.653276920 CET1.1.1.1192.168.2.60x6164No error (0)s3-r-w.sa-east-1.amazonaws.com52.95.164.86A (IP address)IN (0x0001)false
                        • awsserver903203232.s3.sa-east-1.amazonaws.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.6497173.5.233.1744436836C:\Windows\SysWOW64\rundll32.exe
                        TimestampBytes transferredDirectionData
                        2024-03-08 18:43:14 UTC314OUTGET /webPc.zip HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: awsserver903203232.s3.sa-east-1.amazonaws.com
                        Connection: Keep-Alive
                        2024-03-08 18:43:15 UTC305INHTTP/1.1 404 Not Found
                        x-amz-request-id: JQ346M807WVPWYMH
                        x-amz-id-2: ubI19FHlsDANi844u/osa9nS0voFgAhnlpZkMXatCQY+d7AXA0hWTnpaTCetmm4Ks7R6rUzJcgPtz154jSO2GQ1ODHJiSjvE
                        Content-Type: application/xml
                        Transfer-Encoding: chunked
                        Date: Fri, 08 Mar 2024 18:43:14 GMT
                        Server: AmazonS3
                        Connection: close
                        2024-03-08 18:43:15 UTC340INData Raw: 31 34 38 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 45 72 72 6f 72 3e 3c 43 6f 64 65 3e 4e 6f 53 75 63 68 42 75 63 6b 65 74 3c 2f 43 6f 64 65 3e 3c 4d 65 73 73 61 67 65 3e 54 68 65 20 73 70 65 63 69 66 69 65 64 20 62 75 63 6b 65 74 20 64 6f 65 73 20 6e 6f 74 20 65 78 69 73 74 3c 2f 4d 65 73 73 61 67 65 3e 3c 42 75 63 6b 65 74 4e 61 6d 65 3e 61 77 73 73 65 72 76 65 72 39 30 33 32 30 33 32 33 32 3c 2f 42 75 63 6b 65 74 4e 61 6d 65 3e 3c 52 65 71 75 65 73 74 49 64 3e 4a 51 33 34 36 4d 38 30 37 57 56 50 57 59 4d 48 3c 2f 52 65 71 75 65 73 74 49 64 3e 3c 48 6f 73 74 49 64 3e 75 62 49 31 39 46 48 6c 73 44 41 4e 69 38 34 34 75 2f 6f 73 61 39 6e 53 30 76 6f 46 67 41 68 6e 6c 70 5a
                        Data Ascii: 148<?xml version="1.0" encoding="UTF-8"?><Error><Code>NoSuchBucket</Code><Message>The specified bucket does not exist</Message><BucketName>awsserver903203232</BucketName><RequestId>JQ346M807WVPWYMH</RequestId><HostId>ubI19FHlsDANi844u/osa9nS0voFgAhnlpZ


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\System32\loaddll32.exe
                        Wow64 process (32bit):true
                        Commandline:loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll"
                        Imagebase:0xf60000
                        File size:126'464 bytes
                        MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
                        Imagebase:0x1c0000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:19:43:01
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1336 -s 692
                        Imagebase:0xd60000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:9
                        Start time:19:43:04
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:19:43:07
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:19:43:10
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:true

                        Target ID:12
                        Start time:19:43:10
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:false

                        Target ID:13
                        Start time:19:43:10
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:19:43:10
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Reputation:high
                        Has exited:true

                        Target ID:15
                        Start time:19:43:10
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\rundll32.exe
                        Wow64 process (32bit):true
                        Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper
                        Imagebase:0xe30000
                        File size:61'440 bytes
                        MD5 hash:889B99C52A60DD49227C5E485A016679
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Has exited:true

                        Target ID:18
                        Start time:19:43:11
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5348 -s 684
                        Imagebase:0xd60000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:19
                        Start time:19:43:11
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 684
                        Imagebase:0xd60000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:22
                        Start time:19:43:14
                        Start date:08/03/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6836 -s 2140
                        Imagebase:0xd60000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:2.8%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:16.6%
                          Total number of Nodes:175
                          Total number of Limit Nodes:10
                          execution_graph 9224 d90898 9227 b519b8 9224->9227 9226 d908a8 9228 b519c3 9227->9228 9231 b4a6f8 9228->9231 9232 b4a707 9231->9232 9233 b4a70c GetCurrentThreadId 9231->9233 9232->9233 9234 b4a742 9233->9234 9235 b4aa44 9234->9235 9236 b4a7b5 9234->9236 9238 b4aa60 9235->9238 9239 b4aa71 9235->9239 9250 b4a68c 9236->9250 9254 b4a9ac 9238->9254 9240 b4aa7a GetCurrentThreadId 9239->9240 9244 b4aa87 9239->9244 9240->9244 9243 b4aa6a 9243->9239 9245 b46f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9244->9245 9246 b4ab17 FreeLibrary 9244->9246 9247 b4ab3f 9244->9247 9245->9244 9246->9244 9248 b4ab4e ExitProcess 9247->9248 9249 b4ab48 9247->9249 9249->9248 9251 b4a6d4 9250->9251 9252 b4a69c 9250->9252 9251->9226 9252->9251 9260 b502f4 GetSystemInfo 9252->9260 9255 b4a9b6 GetStdHandle WriteFile 9254->9255 9256 b4aa13 9254->9256 9261 b4b5b8 9255->9261 9256->9243 9259 b4aa03 GetStdHandle WriteFile 9259->9243 9260->9252 9262 b4b5be 9261->9262 9262->9259 9263 b459b0 9264 b45c10 9263->9264 9265 b459c8 9263->9265 9267 b45d28 9264->9267 9268 b45bd4 9264->9268 9266 b459da 9265->9266 9279 b45a65 Sleep 9265->9279 9271 b459e9 9266->9271 9277 b45ac8 9266->9277 9281 b45aa9 Sleep 9266->9281 9269 b45d31 9267->9269 9270 b4575c VirtualAlloc 9267->9270 9272 b45c2e 9268->9272 9276 b45bee Sleep 9268->9276 9273 b45797 9270->9273 9274 b45787 9270->9274 9282 b45694 VirtualAlloc 9272->9282 9286 b45c4c 9272->9286 9287 b45710 9274->9287 9276->9272 9278 b45c04 Sleep 9276->9278 9285 b45ad4 9277->9285 9292 b45694 9277->9292 9278->9268 9279->9266 9280 b45a7b Sleep 9279->9280 9280->9265 9281->9277 9284 b45abf Sleep 9281->9284 9282->9286 9284->9266 9288 b45758 9287->9288 9289 b45719 9287->9289 9288->9273 9289->9288 9290 b45724 Sleep 9289->9290 9290->9288 9291 b4573e Sleep 9290->9291 9291->9289 9296 b45628 9292->9296 9294 b4569d VirtualAlloc 9295 b456b4 9294->9295 9295->9285 9297 b455c8 9296->9297 9297->9294 9298 b4d658 9299 b4d668 GetModuleFileNameW 9298->9299 9301 b4d684 9298->9301 9302 b4e8cc GetModuleFileNameW 9299->9302 9303 b4e91a 9302->9303 9308 b4e7a8 9303->9308 9305 b4e946 9306 b4e960 9305->9306 9307 b4e958 LoadLibraryExW 9305->9307 9306->9301 9307->9306 9310 b4e7c9 9308->9310 9309 b4e851 9309->9305 9310->9309 9326 b4e4e4 9310->9326 9312 b4e83e 9313 b4e844 9312->9313 9314 b4e853 GetUserDefaultUILanguage 9312->9314 9315 b4e610 2 API calls 9313->9315 9330 b4de94 EnterCriticalSection 9314->9330 9315->9309 9317 b4e860 9350 b4e610 9317->9350 9319 b4e86d 9320 b4e895 9319->9320 9321 b4e87b GetSystemDefaultUILanguage 9319->9321 9320->9309 9354 b4e6dc 9320->9354 9322 b4de94 17 API calls 9321->9322 9324 b4e888 9322->9324 9325 b4e610 2 API calls 9324->9325 9325->9320 9327 b4e506 9326->9327 9329 b4e510 9326->9329 9362 b4e1c8 9327->9362 9329->9312 9331 b4dee0 LeaveCriticalSection 9330->9331 9332 b4dec0 9330->9332 9399 b4ad14 9331->9399 9334 b4ded1 LeaveCriticalSection 9332->9334 9340 b4df82 9334->9340 9335 b4def1 IsValidLocale 9336 b4df00 9335->9336 9337 b4df4f EnterCriticalSection 9335->9337 9338 b4df14 9336->9338 9339 b4df09 9336->9339 9341 b4df67 9337->9341 9414 b4db7c 9338->9414 9401 b4dd78 GetThreadUILanguage 9339->9401 9340->9317 9345 b4df78 LeaveCriticalSection 9341->9345 9344 b4df1d GetSystemDefaultUILanguage 9344->9337 9346 b4df27 9344->9346 9345->9340 9347 b4df38 GetSystemDefaultUILanguage 9346->9347 9348 b4db7c 3 API calls 9347->9348 9349 b4df12 9348->9349 9349->9337 9352 b4e62e 9350->9352 9351 b4e6a9 9351->9319 9352->9351 9423 b4e5a4 9352->9423 9428 b4adf8 9354->9428 9357 b4e72c 9358 b4e5a4 2 API calls 9357->9358 9359 b4e740 9358->9359 9360 b4e76e 9359->9360 9361 b4e5a4 2 API calls 9359->9361 9360->9309 9361->9360 9363 b4e1df 9362->9363 9364 b4e1f3 GetModuleFileNameW 9363->9364 9365 b4e208 9363->9365 9364->9365 9366 b4e230 RegOpenKeyExW 9365->9366 9369 b4e3d7 9365->9369 9367 b4e257 RegOpenKeyExW 9366->9367 9368 b4e2f1 9366->9368 9367->9368 9370 b4e275 RegOpenKeyExW 9367->9370 9383 b4dfd8 GetModuleHandleW 9368->9383 9369->9329 9370->9368 9372 b4e293 RegOpenKeyExW 9370->9372 9372->9368 9374 b4e2b1 RegOpenKeyExW 9372->9374 9373 b4e30f RegQueryValueExW 9375 b4e360 RegQueryValueExW 9373->9375 9376 b4e32d 9373->9376 9374->9368 9378 b4e2cf RegOpenKeyExW 9374->9378 9377 b4e37c 9375->9377 9382 b4e35e 9375->9382 9379 b4e335 RegQueryValueExW 9376->9379 9380 b4e384 RegQueryValueExW 9377->9380 9378->9368 9378->9369 9379->9382 9380->9382 9381 b4e3c6 RegCloseKey 9381->9329 9382->9381 9384 b4e000 GetProcAddress 9383->9384 9385 b4e011 9383->9385 9384->9385 9386 b4e027 9385->9386 9390 b4e073 9385->9390 9395 b4dfb4 9385->9395 9386->9373 9389 b4dfb4 CharNextW 9389->9390 9390->9386 9391 b4dfb4 CharNextW 9390->9391 9392 b4e0f8 FindFirstFileW 9390->9392 9394 b4e162 lstrlenW 9390->9394 9391->9390 9392->9386 9393 b4e114 FindClose lstrlenW 9392->9393 9393->9386 9393->9390 9394->9390 9396 b4dfc2 9395->9396 9397 b4dfd0 9396->9397 9398 b4dfba CharNextW 9396->9398 9397->9386 9397->9389 9398->9396 9400 b4ad1a 9399->9400 9400->9335 9402 b4dd94 9401->9402 9403 b4dded 9401->9403 9419 b4dd34 GetThreadPreferredUILanguages 9402->9419 9405 b4dd34 2 API calls 9403->9405 9410 b4ddf5 9405->9410 9407 b4de3c SetThreadPreferredUILanguages 9409 b4dd34 2 API calls 9407->9409 9412 b4de52 9409->9412 9410->9407 9413 b4de7d 9410->9413 9411 b4de6d SetThreadPreferredUILanguages 9411->9413 9412->9411 9412->9413 9413->9349 9415 b4dbb7 9414->9415 9416 b4dc20 IsValidLocale 9415->9416 9418 b4dc6e 9415->9418 9417 b4dc33 GetLocaleInfoW GetLocaleInfoW 9416->9417 9416->9418 9417->9418 9418->9344 9420 b4dd55 9419->9420 9421 b4dd6e SetThreadPreferredUILanguages 9419->9421 9422 b4dd5e GetThreadPreferredUILanguages 9420->9422 9421->9403 9422->9421 9424 b4e5b9 9423->9424 9425 b4e5d6 FindFirstFileW 9424->9425 9426 b4e5e6 FindClose 9425->9426 9427 b4e5ec 9425->9427 9426->9427 9427->9352 9429 b4adfc GetUserDefaultUILanguage GetLocaleInfoW 9428->9429 9429->9357

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,00B4E79C,?,?), ref: 00B4E70E
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,00B4E79C,?,?), ref: 00B4E717
                            • Part of subcall function 00B4E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,00B4E602,?,00000001), ref: 00B4E5D7
                            • Part of subcall function 00B4E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,00B4E602,?,00000001), ref: 00B4E5E7
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 2dedf3072cd82bc22eddcdee50e7e8a89547fed6593a05cbd2028f86632782d6
                          • Instruction ID: 0fd68cf97caee1bd32a4cff3cac1af46c3f47ce8f3e92a8c2ab725abe685131b
                          • Opcode Fuzzy Hash: 2dedf3072cd82bc22eddcdee50e7e8a89547fed6593a05cbd2028f86632782d6
                          • Instruction Fuzzy Hash: 33115474A00609ABDB04EFA4D892AAEB7F8FF44300F5044F5F554A7652DB34AF05A662
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 216 b4e5a4-b4e5e4 call b4adf8 call b4b8b4 FindFirstFileW 221 b4e5e6-b4e5e7 FindClose 216->221 222 b4e5ec-b4e601 call b4ad14 216->222 221->222
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,00B4E602,?,00000001), ref: 00B4E5D7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,00B4E602,?,00000001), ref: 00B4E5E7
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 6d123a52e55b3bc69c0a2a198b0fb2316e610dcb98204e4df8cbbfe37c105e7f
                          • Instruction ID: a4a525bcb727110b0d8321ad5007e233ec9352431efeacb765a9f8f5a732409e
                          • Opcode Fuzzy Hash: 6d123a52e55b3bc69c0a2a198b0fb2316e610dcb98204e4df8cbbfe37c105e7f
                          • Instruction Fuzzy Hash: DBF0BE70914A14AFC710EB78CC1385EB7ECEB48710BA104F0F810E2592E6349F00A524
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 232 b502f4-b50304 GetSystemInfo
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction ID: c6cff59e4efc5864e1f2133d74b342be5762588ddb9e0394793c297932f1a11b
                          • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction Fuzzy Hash: 3DA01210408C004BC804E7584C4340B31C41940210FC40250749C95293E6058A680AD7
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00B4E3ED,?,?), ref: 00B4E201
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,00B4E3ED,?,?), ref: 00B4E24A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,00B4E3ED,?,?), ref: 00B4E26C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 00B4E28A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 00B4E2A8
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 00B4E2C6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 00B4E2E4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00B4E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,00B4E3ED), ref: 00B4E324
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,00B4E3D0,?,80000001), ref: 00B4E34F
                          • RegCloseKey.ADVAPI32(?,00B4E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,00B4E3D0,?,80000001,Software\Embarcadero\Locales), ref: 00B4E3CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 27f2065f75dcbf932d85ff9a6c133782c7b855e43632f728fce81990c994f92a
                          • Instruction ID: 5727c3cad0c0726f2dd975135dcdb8503067e406e03874626e9f9a5a4bc266e1
                          • Opcode Fuzzy Hash: 27f2065f75dcbf932d85ff9a6c133782c7b855e43632f728fce81990c994f92a
                          • Instruction Fuzzy Hash: 9851D075A8060CBFEB21DAA4CC42FAE77FCEB48700F5044E5BA14F6592D6B0EB40B655
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF,?,?,00000000,00000000,00000000), ref: 00B4DEB2
                          • LeaveCriticalSection.KERNEL32(00D9CC14,00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF,?,?,00000000,00000000), ref: 00B4DED6
                          • LeaveCriticalSection.KERNEL32(00D9CC14,00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF,?,?,00000000,00000000), ref: 00B4DEE5
                          • IsValidLocale.KERNEL32(00000000,00000002,00D9CC14,00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF), ref: 00B4DEF7
                          • EnterCriticalSection.KERNEL32(00D9CC14,00000000,00000002,00D9CC14,00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF), ref: 00B4DF54
                          • LeaveCriticalSection.KERNEL32(00D9CC14,00D9CC14,00000000,00000002,00D9CC14,00D9CC14,00000000,00B4DF98,?,?,?,00000000,?,00B4E860,00000000,00B4E8BF), ref: 00B4DF7D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: deaa6db5495a31c028af981a24d2f450a37ef2e2959c5e32008c3339003bcb58
                          • Instruction ID: cdcadfd35c8264951748583cc6d3598aaa6586c1123dfeeb09d97aa600dfce10
                          • Opcode Fuzzy Hash: deaa6db5495a31c028af981a24d2f450a37ef2e2959c5e32008c3339003bcb58
                          • Instruction Fuzzy Hash: 74219D20750B146BEF30B7798C02B292AD99F45B40BA455F6F045A6292CEA48F44B3B3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 b4a6f8-b4a705 68 b4a707 67->68 69 b4a70c-b4a740 GetCurrentThreadId 67->69 68->69 70 b4a744-b4a770 call b4a5dc 69->70 71 b4a742 69->71 74 b4a772-b4a774 70->74 75 b4a779-b4a780 70->75 71->70 74->75 76 b4a776 74->76 77 b4a782-b4a785 75->77 78 b4a78a-b4a790 75->78 76->75 77->78 79 b4a795-b4a79c 78->79 80 b4a792 78->80 81 b4a79e-b4a7a5 79->81 82 b4a7ab-b4a7af 79->82 80->79 81->82 83 b4aa44-b4aa5e 82->83 84 b4a7b5 call b4a68c 82->84 86 b4aa60-b4aa6c call b4a924 call b4a9ac 83->86 87 b4aa71-b4aa78 83->87 90 b4a7ba 84->90 86->87 88 b4aa7a-b4aa85 GetCurrentThreadId 87->88 89 b4aa9b-b4aa9f 87->89 88->89 92 b4aa87-b4aa96 call b4a5fc call b4a980 88->92 93 b4aaa1-b4aaa5 89->93 94 b4aab9-b4aabd 89->94 92->89 93->94 97 b4aaa7-b4aab7 93->97 98 b4aabf-b4aac2 94->98 99 b4aac9-b4aacd 94->99 97->94 98->99 102 b4aac4-b4aac6 98->102 103 b4aaec-b4aaf5 call b4a624 99->103 104 b4aacf-b4aad8 call b46f7c 99->104 102->99 113 b4aaf7-b4aafa 103->113 114 b4aafc-b4ab01 103->114 104->103 112 b4aada-b4aaea call b48ea8 call b46f7c 104->112 112->103 113->114 116 b4ab1d-b4ab28 call b4a5fc 113->116 114->116 117 b4ab03-b4ab11 call b4eaec 114->117 124 b4ab2d-b4ab31 116->124 125 b4ab2a 116->125 117->116 127 b4ab13-b4ab15 117->127 129 b4ab33-b4ab35 call b4a980 124->129 130 b4ab3a-b4ab3d 124->130 125->124 127->116 128 b4ab17-b4ab18 FreeLibrary 127->128 128->116 129->130 132 b4ab56-b4ab67 130->132 133 b4ab3f-b4ab46 130->133 132->94 134 b4ab4e-b4ab51 ExitProcess 133->134 135 b4ab48 133->135 135->134
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00B4A72F
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 991d19be60d39a865d29b5772ddd2f47bcac5dc39273b4c2e170d9991b790ae0
                          • Instruction ID: 94e4939f5ab293f29a6a07fa1ebba8eca5c71bfe41325a4a52569d9f69eebd3d
                          • Opcode Fuzzy Hash: 991d19be60d39a865d29b5772ddd2f47bcac5dc39273b4c2e170d9991b790ae0
                          • Instruction Fuzzy Hash: 6C51BA756807059FDB34EF68C88576A7BE4EF08314F1485AAE8098B352D734DE84EB63
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 136 b4e7a8-b4e7ea call b4adf8 * 2 call b4ad14 143 b4e8a4-b4e8be call b4ad74 136->143 144 b4e7f0-b4e800 call b4b13c 136->144 149 b4e807-b4e80c 144->149 150 b4e802-b4e805 144->150 152 b4e833-b4e842 call b4e4e4 149->152 153 b4e80e-b4e817 149->153 150->149 159 b4e844-b4e851 call b4e610 152->159 160 b4e853-b4e870 GetUserDefaultUILanguage call b4de94 call b4e610 152->160 154 b4e82e-b4e831 153->154 155 b4e819-b4e82c call b4bcf0 153->155 154->152 154->153 155->152 159->143 168 b4e895-b4e898 160->168 169 b4e872-b4e879 160->169 168->143 171 b4e89a-b4e89f call b4e6dc 168->171 169->168 170 b4e87b-b4e890 GetSystemDefaultUILanguage call b4de94 call b4e610 169->170 170->168 171->143
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,00B4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00B4E946,00000000,?,00000105), ref: 00B4E853
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,00B4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00B4E946,00000000,?,00000105), ref: 00B4E87B
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 200b7180ac082c30479db741c235961e88dff1395380ede6227a0d6d58d3a258
                          • Instruction ID: 3bd061c7d03a924ffcc59d51cf01bd9864097dafd120aa306c6bda3afb6ca600
                          • Opcode Fuzzy Hash: 200b7180ac082c30479db741c235961e88dff1395380ede6227a0d6d58d3a258
                          • Instruction Fuzzy Hash: 0C31F870E102199BDF14EB98C881AAEB7F5FF44300F5045E5E420A7691DB74EF81EB51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00B4E986,?,00B40000,00D91C1C), ref: 00B4E908
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00B4E986,?,00B40000,00D91C1C), ref: 00B4E959
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: dfa5914c9a47d95633ae0e0d40e9bf11500676abdbb25885ccaa76e06be9a445
                          • Instruction ID: c53349281dc2248b049429f8f20a225dae5d0ee6db3e192d58d1cccac13059ed
                          • Opcode Fuzzy Hash: dfa5914c9a47d95633ae0e0d40e9bf11500676abdbb25885ccaa76e06be9a445
                          • Instruction Fuzzy Hash: 53118F70A4061CABDB24EB64C886BDDB3F8EB04700F5104F5B508A3291DB749F84EA95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 226 b4d658-b4d666 227 b4d693-b4d69e 226->227 228 b4d668-b4d67f GetModuleFileNameW call b4e8cc 226->228 230 b4d684-b4d68b 228->230 230->227 231 b4d68d-b4d690 230->231 231->227
                          APIs
                          • GetModuleFileNameW.KERNEL32(00B40000,?,0000020A), ref: 00B4D676
                            • Part of subcall function 00B4E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,00B4E986,?,00B40000,00D91C1C), ref: 00B4E908
                            • Part of subcall function 00B4E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,00B4E986,?,00B40000,00D91C1C), ref: 00B4E959
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction ID: 5cc7dacf703964e62348ae5df856c72cebe82289acc348bd09bc19abaf6e2740
                          • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction Fuzzy Hash: E0E0E5B1A003109BCF10DE6CC8C5B4637E8AB08754F044AE1AD28DF287E371DE249BE1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 233 b45694-b456b2 call b45628 VirtualAlloc 236 b456b4-b45701 233->236 237 b45702-b4570d 233->237
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,00B45CAB), ref: 00B456AB
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 8fdee3d41bc13496692c319d937fb990eb268b27591e6469a62f39dfb0dd8fe5
                          • Instruction ID: 80c75320b0813530b62e04633848856dd5dc64070c944466ed9ada56137d85b7
                          • Opcode Fuzzy Hash: 8fdee3d41bc13496692c319d937fb990eb268b27591e6469a62f39dfb0dd8fe5
                          • Instruction Fuzzy Hash: 31F087F2B413014BD7289F7C9E417027BE4E708350F11427EE949DB7A9E7B08800C7A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 347 b4dfd8-b4dffe GetModuleHandleW 348 b4e000-b4e00f GetProcAddress 347->348 349 b4e03d-b4e044 347->349 348->349 350 b4e011-b4e025 348->350 351 b4e046-b4e04e 349->351 352 b4e081-b4e084 349->352 350->349 362 b4e027-b4e038 call b4d9fc 350->362 354 b4e054-b4e065 call b4dfb4 351->354 355 b4e18e-b4e197 351->355 353 b4e087-b4e08e 352->353 356 b4e090 353->356 357 b4e093-b4e09b 353->357 354->355 363 b4e06b-b4e079 call b4dfb4 354->363 356->357 357->355 361 b4e0a1-b4e0b1 call b4d9fc 357->361 370 b4e173-b4e177 361->370 362->355 363->355 371 b4e07f 363->371 372 b4e0b6-b4e0c6 call b4dfb4 370->372 373 b4e17d-b4e189 call b4d9fc 370->373 371->353 377 b4e0c8 372->377 378 b4e0cb-b4e0d3 372->378 373->355 377->378 378->355 379 b4e0d9-b4e0eb 378->379 380 b4e0f0-b4e112 call b4d9fc FindFirstFileW 379->380 381 b4e0ed 379->381 380->355 384 b4e114-b4e134 FindClose lstrlenW 380->384 381->380 384->355 385 b4e136-b4e171 call b4d9fc lstrlenW 384->385 385->370
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 00B4DFF5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 00B4E006
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 00B4E106
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 00B4E118
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 00B4E124
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 00B4E169
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: c10dcfd1106b5c7342fd824371f134c6c11bdaeeb2ab9f746c5cd93557fb0b1b
                          • Instruction ID: f9c9380ce73844febb9ba780fcb7518df6196e3a7484270a85ffd2bc802ebd7f
                          • Opcode Fuzzy Hash: c10dcfd1106b5c7342fd824371f134c6c11bdaeeb2ab9f746c5cd93557fb0b1b
                          • Instruction Fuzzy Hash: 89418C31E006189BCB20EAA8CC86ADDB3F6FF44310F1485E59515E7251E7B4EF45EA85
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 00D2A98E
                          • IsIconic.USER32(?), ref: 00D2A9BC
                          • IsWindowVisible.USER32(?), ref: 00D2A9CC
                          • ShowWindow.USER32(?,00000000,00000000,?,?,?,00D37CEF,?,00DA01D8), ref: 00D2A9E9
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D2A9FC
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00D2AA0D
                          • ShowWindow.USER32(?,00000006,00000000,?,?,?,00D37CEF,?,00DA01D8), ref: 00D2AA2D
                          • ShowWindow.USER32(?,00000005,00000000,?,?,?,00D37CEF,?,00DA01D8), ref: 00D2AA37
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Window$LongShow$IconicVisible
                          • String ID:
                          • API String ID: 3484284227-0
                          • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction ID: a0ed1b8af23f5620a368a38541bc015de157799edbceeca8e7775abf72a0ccb4
                          • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction Fuzzy Hash: 3111980164D6B03AD626762D3D02FAF1AE48FE331AF1C49E5F8D4921C3C6198549D637
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • IsValidLocale.KERNEL32(?,00000002,00000000,00B4DCE1,?,?,?,00000000), ref: 00B4DC26
                          • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,00B4DCE1,?,?,?,00000000), ref: 00B4DC42
                          • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,00B4DCE1,?,?,?,00000000), ref: 00B4DC53
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Locale$Info$Valid
                          • String ID:
                          • API String ID: 1826331170-0
                          • Opcode ID: d1b1bf43d52774b3d82dc779af811a58cd291aa9811f5e684b71225fd4f0e82b
                          • Instruction ID: b2f1f8f3cf4557f64120b46602790dad23f992badba16e2ebdfd99270fb8c581
                          • Opcode Fuzzy Hash: d1b1bf43d52774b3d82dc779af811a58cd291aa9811f5e684b71225fd4f0e82b
                          • Instruction Fuzzy Hash: 8C318C74A04A1DABDF20DF64DC81BEEB7F9EB44701F5000EAA608A3291D7705F80EE61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Version
                          • String ID:
                          • API String ID: 1889659487-0
                          • Opcode ID: 3fb6d739126c144bd70642d43eb94d36aabf1d6c736e12c5aa6782ec462e8d46
                          • Instruction ID: eec52f7e77366ef6a33254afee61225bf58497798bdcffaf89ab331d81485ac8
                          • Opcode Fuzzy Hash: 3fb6d739126c144bd70642d43eb94d36aabf1d6c736e12c5aa6782ec462e8d46
                          • Instruction Fuzzy Hash: 30D05272922A0347DA3026188E8136C22D1E392702FE580F2C5028AA8AD67C8489A66A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Iconic
                          • String ID:
                          • API String ID: 110040809-0
                          • Opcode ID: 0ebcc0711a91a7229ed6d0f8d9911c7e02908f3c01c6798dfdcd9083a5762a89
                          • Instruction ID: f5bb53d00faaf6915fbf6b44154f2fb52f31c4d982f748c4180f01debd7580c9
                          • Opcode Fuzzy Hash: 0ebcc0711a91a7229ed6d0f8d9911c7e02908f3c01c6798dfdcd9083a5762a89
                          • Instruction Fuzzy Hash: 91C01270A003409BCB41EB28D880EC03BA2B7A1306FC44AE0E400CB916DB76ACC88BA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                          • Instruction ID: 80da3c8736ea4809c52b827c39e3a32be75657ca6f7c7fb050546c12f5e31e2b
                          • Opcode Fuzzy Hash: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                          • Instruction Fuzzy Hash: 0101D632B057210B874CDD7ECD9952ABAC3ABC8910F09C73DD589C72C4CD318C1AC282
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
                          • Instruction ID: c1f34be03cf0569538104f0038f02cfb84df381903d0011f2ebedd3a3241928c
                          • Opcode Fuzzy Hash: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
                          • Instruction Fuzzy Hash: 76C0E9B550D6066E975C8F1AB480815FBE5FAC8324364C22EA01C83644D73154518A64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 289 b47948-b47962 290 b47964-b47967 289->290 291 b47973-b47984 289->291 292 b47986-b47997 290->292 293 b47969-b4796c 290->293 294 b479aa-b479b6 291->294 292->294 295 b4796e 293->295 296 b47999-b479a3 293->296 297 b47a60-b47a80 CreateFileW 294->297 298 b479bc-b479c0 294->298 299 b47bab-b47bb1 295->299 296->294 300 b47a94-b47a9c 297->300 301 b47a82-b47a8f GetLastError 297->301 302 b479d2-b479df 298->302 303 b479c2-b479cb 298->303 304 b47b64-b47b6c 300->304 305 b47aa2-b47ab7 GetFileSize 300->305 301->299 306 b479e1-b479e7 302->306 307 b479ff-b47a06 GetStdHandle 302->307 303->302 308 b47b7c-b47b82 304->308 309 b47b6e-b47b75 304->309 311 b47ac7-b47acf 305->311 312 b47ab9-b47ac2 call b47930 305->312 313 b479f0 306->313 314 b479e9-b479ee 306->314 310 b47a08-b47a10 307->310 308->299 319 b47b84-b47b8f GetFileType 308->319 309->308 310->308 318 b47a16-b47a21 GetFileType 310->318 315 b47ad1 311->315 316 b47ad3-b47ae1 SetFilePointer 311->316 312->299 317 b479f5-b479fd GetStdHandle 313->317 314->317 315->316 321 b47b02-b47b0b call b47930 316->321 322 b47ae3-b47b00 ReadFile 316->322 317->310 323 b47a23-b47a29 318->323 324 b47a4d-b47a5b 318->324 325 b47b96-b47ba2 call b47930 319->325 326 b47b91-b47b92 319->326 321->299 322->321 328 b47b10-b47b14 322->328 330 b47a3c-b47a48 GetConsoleCP 323->330 331 b47a2b-b47a37 GetConsoleOutputCP 323->331 324->308 325->299 332 b47ba4 326->332 333 b47b94 326->333 328->304 336 b47b16-b47b1a 328->336 330->308 331->308 332->299 333->299 336->304 338 b47b1c-b47b22 336->338 338->304 339 b47b24-b47b27 338->339 340 b47b2d-b47b30 339->340 341 b47b32-b47b46 SetFilePointer 340->341 342 b47b5f-b47b62 340->342 343 b47b54-b47b5d call b47930 341->343 344 b47b48-b47b52 SetEndOfFile 341->344 342->304 342->340 343->299 344->304 344->343
                          APIs
                          • GetStdHandle.KERNEL32(FFFFFFF5), ref: 00B479F6
                          • GetStdHandle.KERNEL32(000000F6), ref: 00B47A01
                          • GetFileType.KERNEL32(00000000), ref: 00B47A19
                          • GetConsoleOutputCP.KERNEL32(00000000), ref: 00B47A2B
                          • GetConsoleCP.KERNEL32(00000000), ref: 00B47A3C
                          • GetFileType.KERNEL32(00000000), ref: 00B47B87
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: ConsoleFileHandleType$Output
                          • String ID:
                          • API String ID: 393880136-0
                          • Opcode ID: 0bb156b9add2d3a501d5555f04c6ec61978bafe020aff03f8476baab6b0119dd
                          • Instruction ID: 8a893e41971c176e24aaaeeb5609d7af66fc814a24fa2d8fa7996a2756461530
                          • Opcode Fuzzy Hash: 0bb156b9add2d3a501d5555f04c6ec61978bafe020aff03f8476baab6b0119dd
                          • Instruction Fuzzy Hash: 2C51A571588600ABEF20EF6888D872636E4EF44350F1489E5E945CF286DF74CB44F7A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 00B496B9
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00B496BF
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00B496D2
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00B496DB
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00B49752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00B49706
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: 48ecc268a2e7a6c8eb468d0d56389d98a2aed12c03bf229dd4a19e10d7eb5b29
                          • Instruction ID: b4886aca89c2e8c8f8807b2530fb34d84365a3357de651019f5d10e58895eec9
                          • Opcode Fuzzy Hash: 48ecc268a2e7a6c8eb468d0d56389d98a2aed12c03bf229dd4a19e10d7eb5b29
                          • Instruction Fuzzy Hash: B7117C74D50608AFDB20EFA5D846BAEB7F8EB40310F5480E6E814A3652E7789F40EB11
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00B51ABC
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 28ad6e58dcadebb5c403483c3409ffb00732a01bc93e56525e08aa0a1ca5ee0b
                          • Instruction ID: df0f465bdc88699dca1568528bd243918f8b473996c93c67a79ad061cebb70ad
                          • Opcode Fuzzy Hash: 28ad6e58dcadebb5c403483c3409ffb00732a01bc93e56525e08aa0a1ca5ee0b
                          • Instruction Fuzzy Hash: 93A140759003099FDB14DFA8D881BEEB7F5FB48311F15499AE915EB380D7709948CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00B76E69
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00B76E85
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00B76EBE
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00B76F3B
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00B76F54
                          • VariantCopy.OLEAUT32(?), ref: 00B76F89
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-3916222277
                          • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction ID: 9e057b7244f3ac510342ccfd0f90e26bde8f9630ccd34bcce083fb747f102725
                          • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction Fuzzy Hash: E751C775A01A2D9BCB26DB58CC81AD9B3FCEF18300F0081E5E51DA7212D730AF848F61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?), ref: 00B45DCA
                          • Sleep.KERNEL32(0000000A,00000000,?), ref: 00B45DE4
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 5a6c1932133e58d7178728cc8fc63f02f0909015ae576973eefc70e4cc1e31fd
                          • Instruction ID: 0226161575ff049bd7c96b645a4a5537a6a6fe28263a4d592485a6058fefaeef
                          • Opcode Fuzzy Hash: 5a6c1932133e58d7178728cc8fc63f02f0909015ae576973eefc70e4cc1e31fd
                          • Instruction Fuzzy Hash: 1071D272605F008FD735CF69C984B1ABBD4EF85710F1882EAE4498B397D6B09E41E792
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetCapture.USER32 ref: 00D37752
                          • IsWindowUnicode.USER32(00000000), ref: 00D37795
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 00D377B0
                          • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 00D377CF
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00D377DE
                          • GetWindowThreadProcessId.USER32(?,?), ref: 00D377EF
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 00D3780F
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                          • String ID:
                          • API String ID: 1994056952-0
                          • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction ID: 1fc28f7d97a9f8b7352019545b5d4e8dd62f8703fcd4b3b7a090b50996a6a08f
                          • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction Fuzzy Hash: 952124B1208A08AFE6B0EA59C985FA773DCDF14310F1888A8FD99C3242EA50FC05C775
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ec4f40b44b35a749109a2de0c44df6d960b7e4c8231563b8f352f529a847b97
                          • Instruction ID: 0a936c6c22ac8562cde59d79a3d01fdc2684235e94c51a9d5699685776d6b85c
                          • Opcode Fuzzy Hash: 1ec4f40b44b35a749109a2de0c44df6d960b7e4c8231563b8f352f529a847b97
                          • Instruction Fuzzy Hash: 7AC10462710F004BD724AA7CDC8576EB3C6DBC5321F1882BAE255CB397DA64CE45A392
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00B49DB8: GetCurrentThreadId.KERNEL32 ref: 00B49DBB
                          • GetTickCount.KERNEL32 ref: 00B49963
                          • GetTickCount.KERNEL32 ref: 00B4997B
                          • GetCurrentThreadId.KERNEL32 ref: 00B499AA
                          • GetTickCount.KERNEL32 ref: 00B499D5
                          • GetTickCount.KERNEL32 ref: 00B49A0C
                          • GetTickCount.KERNEL32 ref: 00B49A36
                          • GetCurrentThreadId.KERNEL32 ref: 00B49AA6
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: c134234c3c77b64cd71ac50d5029b1ac3a1ad7f597b6120d42b1a2c7a8334bd3
                          • Instruction ID: 67ffea3cfc888e6e27e5c86975aac391fce3d9a379aedffab8b1a5497bcad091
                          • Opcode Fuzzy Hash: c134234c3c77b64cd71ac50d5029b1ac3a1ad7f597b6120d42b1a2c7a8334bd3
                          • Instruction Fuzzy Hash: 9F417E312087419FD721EE7CC88436FBBD1EF91350F148AADD4E887286EA74DA80A752
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00D379A4
                          • IsWindowUnicode.USER32 ref: 00D379B8
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D379DB
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00D379F1
                          • TranslateMessage.USER32 ref: 00D37A76
                          • DispatchMessageW.USER32 ref: 00D37A83
                          • DispatchMessageA.USER32 ref: 00D37A8B
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                          • String ID:
                          • API String ID: 2190272339-0
                          • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction ID: 5c4676b84d6fe4c702ead9162c3435196c2dba47c8d05bb8fb5726d0a775ef64
                          • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction Fuzzy Hash: DB2157E030CB4676EA3166698C02B7E97C58FD3706F284899F889A71C3C7929D068232
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,00D908A8,00000000,?,00B4AA6A,?,?,00D9CB9C,00D9CB9C,?,?,00D91C38,00B51A03,00D908A8), ref: 00B4A9E5
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,00D908A8,00000000,?,00B4AA6A,?,?,00D9CB9C,00D9CB9C,?,?,00D91C38,00B51A03), ref: 00B4A9EB
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,00D908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,00D908A8,00000000,?,00B4AA6A,?,?,00D9CB9C), ref: 00B4AA06
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,00D908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,00D908A8,00000000,?,00B4AA6A,?,?), ref: 00B4AA0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: e57b8d302e26e8144a9d27c5009e12024560b1f456b7b286bfb9939a4548bd3b
                          • Instruction ID: 53a49ae90b4d58890ef4f1e19bdf52b2782b5d0a1ce22e244ec4a6f294dd3f9c
                          • Opcode Fuzzy Hash: e57b8d302e26e8144a9d27c5009e12024560b1f456b7b286bfb9939a4548bd3b
                          • Instruction Fuzzy Hash: 4AF0F0666C4B457EFB30B3A84C07F6926DC9706F20F500297B264A91C6C7A04AC8B7B3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00B4629A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 00B462A0
                          • GetStdHandle.KERNEL32(000000F4,00B453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 00B462BF
                          • WriteFile.KERNEL32(00000000,000000F4,00B453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 00B462C5
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,00B453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 00B462DC
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,00B453E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 00B462E2
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID:
                          • API String ID: 3320372497-0
                          • Opcode ID: 9814bbb91de0c9b8bc053d6407f82600a176f69f43a93cde4d30ca27fe14a8b7
                          • Instruction ID: 62febf485051f69c5233ec558fb617ecc2e55c4bcafc220330752503d9502543
                          • Opcode Fuzzy Hash: 9814bbb91de0c9b8bc053d6407f82600a176f69f43a93cde4d30ca27fe14a8b7
                          • Instruction Fuzzy Hash: B5013195254B143FE520B6B89C86F6F2ACC9B16760F100696B218D71D7CA909E44A2B6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00B45A67
                          • Sleep.KERNEL32(0000000A,00000000), ref: 00B45A7D
                          • Sleep.KERNEL32(00000000), ref: 00B45AAB
                          • Sleep.KERNEL32(0000000A,00000000), ref: 00B45AC1
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: a7a94ff096ea73f7318e923e88ec712c88a3f59afeb0dd22bc23018f912baa3e
                          • Instruction ID: ab19906d4b4247b426085353763a433f883ebef2a34ccbf85dce925c594d4ead
                          • Opcode Fuzzy Hash: a7a94ff096ea73f7318e923e88ec712c88a3f59afeb0dd22bc23018f912baa3e
                          • Instruction Fuzzy Hash: 3FC11572600F518BCB29CF2DD980725BBE1FB85310F1982EAD455CB396C3B09A45DBE1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(00D364D4,00000000), ref: 00D3661E
                          • ShowWindow.USER32(?,00000000,00D364D4,00000000), ref: 00D36660
                          • ShowOwnedPopups.USER32(00000000,?), ref: 00D3668F
                          • ShowWindow.USER32(?,00000005), ref: 00D36704
                          • ShowOwnedPopups.USER32(00000000,?), ref: 00D36733
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Show$OwnedPopupsWindow$EnumWindows
                          • String ID:
                          • API String ID: 315437064-0
                          • Opcode ID: 3eb990d9b77a1a8c4c82dd2a31c0b0eebf1ce943e5950be376f8c98b0c8aeab5
                          • Instruction ID: 7620259ee7ff057fa0a226cf8af5dd601a0a3184e9e83b303c24f97c2090f896
                          • Opcode Fuzzy Hash: 3eb990d9b77a1a8c4c82dd2a31c0b0eebf1ce943e5950be376f8c98b0c8aeab5
                          • Instruction Fuzzy Hash: B241B670700B409FD720DB38C885BAA73E1FB44358F4989B8E859C76A1C774EC85DB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhookWindowsHookEx.USER32(00000000), ref: 00D356E6
                          • SetEvent.KERNEL32(00000000), ref: 00D35712
                          • GetCurrentThreadId.KERNEL32 ref: 00D35717
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 00D35740
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00D3574D
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                          • String ID:
                          • API String ID: 2132507429-0
                          • Opcode ID: 708b779810b2184d30ac3125f04921e424a336d398b70e96411d3bb2c0cb07fb
                          • Instruction ID: 0bee7f6ce08153505105518f76755bfba7622c09a957eb8a846a5d04f9448a2f
                          • Opcode Fuzzy Hash: 708b779810b2184d30ac3125f04921e424a336d398b70e96411d3bb2c0cb07fb
                          • Instruction Fuzzy Hash: FC01D1B0605701DFE310EB64ED81B5A37E4AB0A310F4486AAB9A8C72E5DB309844CB71
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 00B4DD89
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 00B4DDE7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 00B4DE44
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 00B4DE77
                            • Part of subcall function 00B4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,00B4DDF5), ref: 00B4DD4B
                            • Part of subcall function 00B4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,00B4DDF5), ref: 00B4DD68
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: b5f5be137e0b8fce90f775eb2dde7b93255e1c9eef458402257f8109420ac870
                          • Instruction ID: 1f5ef35a7aad2cd818e8f07ecf7d9762872a77cd9244cdb96a6e10a32bb46696
                          • Opcode Fuzzy Hash: b5f5be137e0b8fce90f775eb2dde7b93255e1c9eef458402257f8109420ac870
                          • Instruction Fuzzy Hash: E2312B30E0021A9BDF10DFA8C885AAEB7F4EF14300F5045A6E555EB291DB749F05DB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetActiveWindow.USER32(?,?,00DA01D8,00D37DC8), ref: 00D3714E
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction ID: 09d92d953de4be6148bb0080ed4000a1ce1858037f5036feded3d03506a8b19e
                          • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction Fuzzy Hash: 6931F9B0604680ABDB64EF6CC8C5B9A37A6AF08304F4854B1FD05DF28BDA64DC85C775
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindow.USER32(?,00000004), ref: 00D364E6
                          • GetWindowThreadProcessId.USER32(?,?), ref: 00D36503
                          • GetCurrentProcessId.KERNEL32(?,00000004), ref: 00D3650F
                          • IsWindowVisible.USER32(?), ref: 00D36569
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Window$Process$CurrentThreadVisible
                          • String ID:
                          • API String ID: 3926708836-0
                          • Opcode ID: 7f4556c54a41d843a968d15d78a5e3f2a93a43a85839a18a02e23b30afc47b2c
                          • Instruction ID: 5d921c265ddcad8cf35465da8b2f651b0d6a71409d7086ff42dda80584355261
                          • Opcode Fuzzy Hash: 7f4556c54a41d843a968d15d78a5e3f2a93a43a85839a18a02e23b30afc47b2c
                          • Instruction Fuzzy Hash: 61312932A00355ABDB50DF69D8C5BAA77E4EB15320F0881B1ED04E735ADB30EE448BA0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(00D361C0), ref: 00D362B1
                          • GetWindow.USER32(00000003,00000003), ref: 00D362C9
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 00D362D6
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 00D36315
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Window$EnumLongWindows
                          • String ID:
                          • API String ID: 4191631535-0
                          • Opcode ID: fcfa70be2a010dd1c65eb208e1d0e0e492fae105456f92b71a6b34161b846907
                          • Instruction ID: f7402aecec41cbd75a1023602541732ce79de9a45ba203b9693fe4d36ccc1dfe
                          • Opcode Fuzzy Hash: fcfa70be2a010dd1c65eb208e1d0e0e492fae105456f92b71a6b34161b846907
                          • Instruction Fuzzy Hash: 5A112731608710AFEA10AA28C885F9A77D4DB45761F5982B4FD98AF2D2C7609C48CB76
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00C73E7D
                          • GetCurrentProcessId.KERNEL32(?,?,00000000,00D3985D,?,?,?,00000001,00D37A37), ref: 00C73E86
                          • GlobalFindAtomW.KERNEL32(00000000), ref: 00C73E9B
                          • GetPropW.USER32(00000000,00000000), ref: 00C73EB2
                          Memory Dump Source
                          • Source File: 00000005.00000002.2149493533.0000000000B5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B40000, based on PE: true
                          • Associated: 00000005.00000002.2149480971.0000000000B40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149493533.0000000000B41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149663448.0000000000D91000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149686293.0000000000D92000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149702481.0000000000D93000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149717840.0000000000D97000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149738015.0000000000D98000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149751958.0000000000D9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149765957.0000000000DA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149779009.0000000000DA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000005.00000002.2149792026.0000000000DA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b40000_rundll32.jbxd
                          Similarity
                          • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                          • String ID:
                          • API String ID: 2582817389-0
                          • Opcode ID: 1dc8f93c8f3b3f32c217e8c07726fc32b3b80fc8b4141eab3ccee200c505427f
                          • Instruction ID: 2598a5cbec5c582e497da3f2d64198b4906ea06a3b7833cb83cd160ac51177d8
                          • Opcode Fuzzy Hash: 1dc8f93c8f3b3f32c217e8c07726fc32b3b80fc8b4141eab3ccee200c505427f
                          • Instruction Fuzzy Hash: 1DF065513002B16A9A21B7B59C81A3F67CCC9453A234048A1FD49D7253D625CE49A778
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:7.3%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:1%
                          Total number of Nodes:1222
                          Total number of Limit Nodes:16
                          execution_graph 11610 449d0e8 IsUserAnAdmin 11611 449d16b 11610->11611 11615 449d111 11610->11615 11654 449ce98 11611->11654 11613 449d175 11614 449d183 GetMessageW 11613->11614 11616 449d177 TranslateMessage DispatchMessageW 11614->11616 11619 449d193 11614->11619 11615->11614 11626 4286358 11615->11626 11616->11614 11621 449d13d 11641 449edcc 11621->11641 11623 449d155 11645 44a5dcc 11623->11645 11625 449d169 11625->11614 11669 426b8b4 11626->11669 11628 428636b GetFileAttributesW 11629 42863ff GetLastError 11628->11629 11630 428637e 11628->11630 11631 4286386 11629->11631 11630->11631 11632 42863c8 11630->11632 11633 428639a CreateFileW 11630->11633 11631->11614 11638 4286dc8 11631->11638 11632->11631 11635 42863d4 CreateFileW 11632->11635 11633->11631 11634 42863b7 CloseHandle 11633->11634 11634->11631 11636 42863fb 11635->11636 11637 42863f1 CloseHandle 11635->11637 11636->11631 11637->11631 11639 426b8b4 11638->11639 11640 4286dd4 CreateDirectoryW 11639->11640 11640->11621 11642 449ede0 11641->11642 11671 44a3a58 11642->11671 11644 449ee1b 11644->11623 11646 44a5de0 11645->11646 11647 44a5df0 Sleep 11646->11647 11648 44a5e14 11647->11648 11649 44a5e1d URLDownloadToFileW 11648->11649 11650 44a5e39 11649->11650 11825 44a3be0 11650->11825 11652 44a5e55 Sleep 11653 44a5e79 11652->11653 11653->11625 11655 449ced9 11654->11655 12477 44585dc 11655->12477 11657 449cf02 11658 44585dc 2 API calls 11657->11658 11659 449cf24 11658->11659 11660 449cf37 ShellExecuteExW 11659->11660 11661 449cf4b WaitForSingleObject 11660->11661 11662 449cf9c 11660->11662 11664 449cf64 MsgWaitForMultipleObjects 11661->11664 11663 449ce98 131 API calls 11662->11663 11668 449cfa6 11663->11668 11665 449cf58 11664->11665 11666 449cf7d GetExitCodeProcess CloseHandle 11664->11666 12480 4457aa4 11665->12480 11666->11668 11668->11613 11670 426b8ba 11669->11670 11670->11628 11673 44a3a88 11671->11673 11672 44a3b19 11679 42700bc 11672->11679 11673->11672 11698 4285b0c 11673->11698 11675 44a3b82 11695 426ad5c 11675->11695 11678 44a3ba2 11678->11644 11680 426ad5c SysFreeString 11679->11680 11681 42700e4 11680->11681 11682 427013f 11681->11682 11702 426b810 11681->11702 11684 426ad5c SysFreeString 11682->11684 11685 4270154 11684->11685 11685->11675 11686 42700ff 11708 426ff18 11686->11708 11689 427011f 11691 426b810 2 API calls 11689->11691 11690 427012c 11692 426ad5c SysFreeString 11690->11692 11693 427012a 11691->11693 11692->11693 11715 426b168 11693->11715 11696 426ad62 SysFreeString 11695->11696 11697 426ad70 11695->11697 11696->11697 11697->11678 11699 4285b1c 11698->11699 11700 4285b3d 11699->11700 11734 42847d4 11699->11734 11700->11673 11703 426b81d 11702->11703 11707 426b824 11702->11707 11725 426acfc 11703->11725 11729 426b660 11707->11729 11709 426ff2d 11708->11709 11714 426ff4a 11708->11714 11710 426ff88 11709->11710 11712 426ff35 11709->11712 11733 42702d4 MultiByteToWideChar 11710->11733 11732 42702d4 MultiByteToWideChar 11712->11732 11714->11689 11714->11690 11716 426b18f 11715->11716 11717 426b16c 11715->11717 11716->11682 11718 426ad5c 11717->11718 11721 426b17f SysReAllocStringLen 11717->11721 11719 426ad62 SysFreeString 11718->11719 11720 426ad70 11718->11720 11719->11720 11720->11682 11721->11716 11722 426acf4 11721->11722 11723 426ad10 11722->11723 11724 426ad00 SysAllocStringLen 11722->11724 11723->11682 11724->11722 11724->11723 11726 426ad10 11725->11726 11727 426ad00 SysAllocStringLen 11725->11727 11726->11707 11727->11726 11728 426acf4 11727->11728 11728->11725 11730 426b666 SysFreeString 11729->11730 11731 426b66c 11729->11731 11730->11731 11731->11686 11732->11714 11733->11714 11739 428bf28 11734->11739 11736 42847ed 11745 426a390 11736->11745 11740 428bf36 11739->11740 11749 4270240 11740->11749 11742 428bf60 11754 4287288 11742->11754 11744 428bf6e 11744->11736 11747 426a394 11745->11747 11746 426a3dc 11746->11746 11747->11746 11807 4266fb0 11747->11807 11751 4270248 11749->11751 11750 4270295 11750->11742 11751->11750 11757 426d6a0 11751->11757 11753 4270284 LoadStringW 11753->11750 11790 42872b0 11754->11790 11758 426d6cd 11757->11758 11759 426d6ae 11757->11759 11758->11753 11759->11758 11762 426d658 11759->11762 11763 426d684 11762->11763 11764 426d668 GetModuleFileNameW 11762->11764 11763->11753 11766 426e8cc GetModuleFileNameW 11764->11766 11767 426e91a 11766->11767 11772 426e7a8 11767->11772 11769 426e946 11770 426e958 LoadLibraryExW 11769->11770 11771 426e960 11769->11771 11770->11771 11771->11763 11774 426e7c9 11772->11774 11773 426e851 11773->11769 11774->11773 11775 426e4e4 19 API calls 11774->11775 11776 426e83e 11775->11776 11777 426e844 11776->11777 11778 426e853 GetUserDefaultUILanguage 11776->11778 11779 426e610 FindFirstFileW FindClose 11777->11779 11780 426de94 17 API calls 11778->11780 11779->11773 11781 426e860 11780->11781 11782 426e610 FindFirstFileW FindClose 11781->11782 11783 426e86d 11782->11783 11784 426e895 11783->11784 11785 426e87b GetSystemDefaultUILanguage 11783->11785 11784->11773 11787 426e6dc FindFirstFileW FindClose GetUserDefaultUILanguage GetLocaleInfoW 11784->11787 11786 426de94 17 API calls 11785->11786 11788 426e888 11786->11788 11787->11773 11789 426e610 FindFirstFileW FindClose 11788->11789 11789->11784 11793 42872e0 11790->11793 11792 42872a8 11792->11744 11794 42872e9 11793->11794 11797 4287349 11794->11797 11799 4287198 11794->11799 11796 42873b0 11796->11792 11797->11796 11798 4287198 72 API calls 11797->11798 11798->11797 11802 4287618 11799->11802 11801 42871b1 11801->11797 11803 4287672 11802->11803 11806 428766b 11802->11806 11803->11801 11804 428711c 72 API calls 11804->11806 11805 4285ad4 26 API calls 11805->11806 11806->11803 11806->11804 11806->11805 11810 427144c 11807->11810 11809 4266fb5 11809->11746 11811 4271481 TlsGetValue 11810->11811 11812 427145b 11810->11812 11813 4271466 11811->11813 11814 427148b 11811->11814 11812->11809 11818 4271380 11813->11818 11814->11809 11816 427146b TlsGetValue 11817 427147a 11816->11817 11817->11809 11819 4271386 11818->11819 11820 42713aa 11819->11820 11824 427136c LocalAlloc 11819->11824 11820->11816 11822 42713a6 11822->11820 11823 42713b6 TlsSetValue 11822->11823 11823->11820 11824->11822 11826 44a3be9 11825->11826 11847 44a59f8 11826->11847 11828 44a3ccd 11853 4475684 11828->11853 11834 44a3d0b 11908 42868b8 11834->11908 11836 44a3d3a 11837 42868b8 5 API calls 11836->11837 11838 44a3d64 11837->11838 11917 428edd8 11838->11917 11840 44a3d71 11841 44a3d9f MoveFileW Sleep 11840->11841 11842 44a3dc4 11841->11842 11923 44a21c4 11842->11923 11844 44a3de0 11927 44a58e8 Sleep WinExec Sleep 11844->11927 11846 44a3def Sleep 11846->11652 11848 44a5a0c 11847->11848 11928 4316fb0 11848->11928 11850 44a5a59 11933 4316ec4 11850->11933 11852 44a5aa2 11852->11828 11854 44757f4 74 API calls 11853->11854 11855 447569b 11854->11855 11856 44756ab 11855->11856 11859 428be58 46 API calls 11855->11859 11857 4316b8c 80 API calls 11856->11857 11858 44756e4 11857->11858 12001 4475734 11858->12001 11861 44756cf 11859->11861 11863 426a390 4 API calls 11861->11863 11863->11856 11864 44764cc 11865 44764f4 11864->11865 11866 44764dd 11864->11866 11868 4476513 11865->11868 12190 4475ccc 11865->12190 11867 428be58 46 API calls 11866->11867 11869 44764ef 11867->11869 11872 44757f4 11868->11872 11870 426a390 4 API calls 11869->11870 11870->11865 11873 4475811 11872->11873 11874 4475c11 11873->11874 11876 447587c 11873->11876 11882 4475a92 11873->11882 11875 42a004c 72 API calls 11874->11875 11877 4475c33 11875->11877 11878 426c24c 16 API calls 11876->11878 11877->11834 11879 44758a9 11878->11879 11880 429e5b4 50 API calls 11879->11880 11881 44758b4 11880->11881 11884 426c50c 26 API calls 11881->11884 11883 4475b12 11882->11883 11885 426d280 26 API calls 11882->11885 12465 4473698 11883->12465 11886 44758d1 11884->11886 11885->11883 11887 426c50c 26 API calls 11886->11887 11889 44758e2 11887->11889 11891 426c24c 16 API calls 11889->11891 11893 44758fd 11891->11893 11893->11834 11895 4473658 46 API calls 11896 4475b80 11895->11896 11897 4473658 46 API calls 11896->11897 11898 4475b97 11897->11898 11899 4473658 46 API calls 11898->11899 11900 4475bae 11899->11900 11901 4473698 46 API calls 11900->11901 11902 4475bc4 11901->11902 11903 4473698 46 API calls 11902->11903 11904 4475bda 11903->11904 11905 4473658 46 API calls 11904->11905 11906 4475bf1 11905->11906 11906->11874 12473 44735e0 11906->12473 11909 426b8b4 11908->11909 11910 42868c5 DeleteFileW 11909->11910 11911 428690d 11910->11911 11912 42868d7 GetLastError GetFileAttributesW 11910->11912 11911->11836 11913 42868e9 11912->11913 11914 4286907 SetLastError 11912->11914 11913->11914 11915 42868f2 11913->11915 11914->11911 11916 42868f9 RemoveDirectoryW 11915->11916 11916->11911 11918 428eded 11917->11918 11919 428edfe GetEnvironmentVariableW 11918->11919 11920 428ee1d 11919->11920 11921 428ee10 11919->11921 11922 428ee2f GetEnvironmentVariableW 11920->11922 11921->11840 11922->11921 11924 44a21db 11923->11924 11925 44a220f ShellExecuteW 11924->11925 11926 44a223b 11925->11926 11926->11844 11927->11846 11936 4316b8c 11928->11936 11930 4316fc7 11940 4316f60 11930->11940 11932 4316fe2 11932->11850 11934 4316b8c 80 API calls 11933->11934 11935 4316ede 11934->11935 11935->11852 11937 4316b95 11936->11937 11944 4316bd0 11937->11944 11939 4316bb1 11939->11930 11942 4316f74 11940->11942 11941 4316faa 11941->11932 11942->11941 11988 4315324 11942->11988 11945 4316beb 11944->11945 11946 4316c96 11945->11946 11947 4316c18 11945->11947 11969 4285ee4 11946->11969 11984 4285f3c 11947->11984 11951 4316ca0 11958 4316cfb 11951->11958 11973 4286ca4 11951->11973 11953 4316c35 11955 4286ca4 2 API calls 11953->11955 11953->11958 11954 4316cbb GetLastError 11979 428a7e4 11954->11979 11957 4316c54 GetLastError 11955->11957 11960 428a7e4 2 API calls 11957->11960 11958->11939 11959 4316cd4 11961 428bf28 72 API calls 11959->11961 11962 4316c6d 11960->11962 11963 4316cf6 11961->11963 11964 428bf28 72 API calls 11962->11964 11965 426a390 4 API calls 11963->11965 11966 4316c8f 11964->11966 11965->11958 11967 426a390 4 API calls 11966->11967 11968 4316c94 11967->11968 11968->11958 11970 4285f38 11969->11970 11971 4285efa 11969->11971 11970->11951 11971->11970 11972 4285f32 CreateFileW 11971->11972 11972->11970 11974 426b8b4 11973->11974 11975 4286cc4 GetFullPathNameW 11974->11975 11976 4286ce5 11975->11976 11977 4286cd6 11975->11977 11976->11977 11978 4286cfa GetFullPathNameW 11976->11978 11977->11954 11978->11977 11980 428a7fb FormatMessageW 11979->11980 11981 428a7f5 11979->11981 11982 428a81d 11980->11982 11981->11980 11983 428a843 LocalFree 11982->11983 11983->11959 11985 4285f8a 11984->11985 11986 4285f52 11984->11986 11985->11953 11987 4285f84 CreateFileW 11986->11987 11987->11985 11989 4315341 11988->11989 11995 431535e 11989->11995 11997 428be58 11989->11997 11991 4315399 11991->11941 11992 4315359 11993 426a390 4 API calls 11992->11993 11993->11995 11994 428be58 46 API calls 11994->11995 11995->11991 11995->11994 11996 426a390 4 API calls 11995->11996 11996->11995 11998 428be5f 11997->11998 11999 4270240 46 API calls 11998->11999 12000 428be77 11999->12000 12000->11992 12002 44757f4 74 API calls 12001->12002 12003 447574a 12002->12003 12004 428be58 46 API calls 12003->12004 12009 4475765 12003->12009 12005 4475760 12004->12005 12006 426a390 4 API calls 12005->12006 12006->12009 12007 4475701 12007->11864 12008 4475791 12008->12007 12014 44744d0 12008->12014 12009->12008 12011 428be58 46 API calls 12009->12011 12012 447578c 12011->12012 12013 426a390 4 API calls 12012->12013 12013->12008 12015 44744e9 12014->12015 12034 42a004c 12015->12034 12018 447473b 12052 426c24c 12018->12052 12020 4474521 12023 428be58 46 API calls 12020->12023 12026 447453c 12020->12026 12024 4474537 12023->12024 12025 426a390 4 API calls 12024->12025 12025->12026 12026->12018 12027 428be58 46 API calls 12026->12027 12028 426a390 4 API calls 12026->12028 12029 4473568 46 API calls 12026->12029 12030 44735a4 46 API calls 12026->12030 12031 44734f0 46 API calls 12026->12031 12032 426d280 26 API calls 12026->12032 12047 429ff94 12026->12047 12027->12026 12028->12026 12029->12026 12030->12026 12031->12026 12032->12026 12058 42a25cc 12034->12058 12039 4474fbc 12040 4474fe9 12039->12040 12126 426d280 12040->12126 12042 447502b 12044 44751ac 12042->12044 12046 4475222 12042->12046 12129 44734f0 12042->12129 12045 426d280 26 API calls 12044->12045 12044->12046 12045->12046 12046->12020 12133 42a1198 12047->12133 12049 429ffab 12050 426cab8 26 API calls 12049->12050 12051 429ffd6 12050->12051 12051->12026 12053 426c27f 12052->12053 12054 426c262 12052->12054 12053->12007 12054->12053 12055 426c281 12054->12055 12150 426c2c4 12054->12150 12055->12053 12163 426fd20 12055->12163 12059 42a25d7 12058->12059 12061 42a25ee 12058->12061 12060 428be58 46 API calls 12059->12060 12062 42a25e9 12060->12062 12063 42a260d 12061->12063 12066 42a2420 26 API calls 12061->12066 12065 426a390 4 API calls 12062->12065 12064 42a0058 12063->12064 12071 42a0714 12063->12071 12068 42a2420 12064->12068 12065->12061 12066->12063 12077 426cfd8 12068->12077 12070 42a0061 12070->12018 12070->12039 12072 42a072c 12071->12072 12073 428be58 46 API calls 12072->12073 12076 42a075e 12072->12076 12074 42a0759 12073->12074 12075 426a390 4 API calls 12074->12075 12075->12076 12076->12064 12078 426cffb 12077->12078 12079 426d016 12077->12079 12078->12070 12080 426d084 12079->12080 12082 426d151 12079->12082 12087 426d0eb 12080->12087 12088 426cf94 12080->12088 12082->12087 12105 426cab8 12082->12105 12083 426cfd8 26 API calls 12083->12087 12085 426d09c 12085->12087 12098 426c990 12085->12098 12087->12078 12087->12083 12089 427144c 4 API calls 12088->12089 12090 426cf9d 12089->12090 12091 426cfa5 12090->12091 12092 426cfb3 12090->12092 12093 427144c 4 API calls 12091->12093 12095 427144c 4 API calls 12092->12095 12094 426cfaa 12093->12094 12094->12085 12096 426cfc1 12095->12096 12097 427144c 4 API calls 12096->12097 12097->12094 12099 426c9ac 12098->12099 12100 426c9f0 12098->12100 12099->12100 12101 426ca2a 12099->12101 12102 426ca59 12099->12102 12100->12087 12101->12100 12104 426c990 26 API calls 12101->12104 12102->12100 12109 426c6b4 12102->12109 12104->12101 12106 426cac1 12105->12106 12107 426cac9 12105->12107 12116 426c878 12106->12116 12107->12087 12110 426c853 12109->12110 12113 426c6d7 12109->12113 12110->12102 12111 426c990 26 API calls 12111->12113 12112 426c6b4 26 API calls 12112->12113 12113->12110 12113->12111 12113->12112 12114 426fd4c 26 API calls 12113->12114 12115 426fd20 14 API calls 12113->12115 12114->12113 12115->12113 12117 426c88d 12116->12117 12125 426c8aa 12116->12125 12118 426c892 12117->12118 12119 426c8de 12117->12119 12121 426c8a1 12118->12121 12122 426c91d 12118->12122 12118->12125 12120 426b168 SysAllocStringLen SysFreeString SysReAllocStringLen 12119->12120 12119->12125 12120->12119 12124 426c50c 26 API calls 12121->12124 12121->12125 12123 426c878 26 API calls 12122->12123 12122->12125 12123->12122 12124->12121 12125->12107 12127 426cfd8 26 API calls 12126->12127 12128 426d28a 12127->12128 12128->12042 12130 4473505 12129->12130 12131 4473538 12130->12131 12132 428be58 46 API calls 12130->12132 12131->12042 12132->12131 12134 42a11a8 12133->12134 12135 42a11bb 12134->12135 12136 42a11b1 12134->12136 12137 42a11c4 12135->12137 12147 428bd18 12135->12147 12141 42a1158 12136->12141 12137->12049 12143 42a116c 12141->12143 12142 42a1177 12144 42a2420 26 API calls 12142->12144 12143->12142 12145 428bd18 4 API calls 12143->12145 12146 42a1194 12144->12146 12145->12143 12146->12049 12148 426a390 4 API calls 12147->12148 12149 428bd22 12148->12149 12149->12137 12151 426c2cd 12150->12151 12162 426c2fa 12150->12162 12152 426c32c 12151->12152 12153 426c2ea 12151->12153 12151->12162 12154 426c333 12152->12154 12155 426c33d 12152->12155 12156 426c36f 12153->12156 12161 426c2f2 12153->12161 12153->12162 12158 426ad5c SysFreeString 12154->12158 12167 426add4 12155->12167 12159 426c2c4 16 API calls 12156->12159 12156->12162 12158->12162 12159->12156 12160 426c24c 16 API calls 12160->12161 12161->12160 12161->12162 12162->12054 12164 426fd45 12163->12164 12165 426fd2b 12163->12165 12164->12055 12171 426fcec 12165->12171 12169 426adda 12167->12169 12168 426ade0 SysFreeString 12168->12169 12169->12168 12170 426adf2 12169->12170 12170->12162 12172 426fcf0 12171->12172 12173 426fcfd 12171->12173 12175 426f9cc 12172->12175 12173->12164 12176 426f9ec 12175->12176 12177 426fa78 12175->12177 12182 426f634 12176->12182 12177->12173 12179 426fa14 12186 426f69c 12179->12186 12183 426f647 12182->12183 12184 426f63d 12182->12184 12183->12179 12185 426992c 13 API calls 12184->12185 12185->12183 12187 426f6a5 12186->12187 12188 426f6ac 12186->12188 12189 4269ac4 GetCurrentThreadId Sleep 12187->12189 12188->12173 12189->12188 12191 4475d17 12190->12191 12192 426c24c 16 API calls 12191->12192 12193 4475d96 12192->12193 12220 4476924 12193->12220 12197 4475dc5 12245 44754dc 12197->12245 12199 4475ded 12200 4475df5 12199->12200 12201 4475e7c 12199->12201 12203 426c24c 16 API calls 12200->12203 12266 428d6b8 12201->12266 12205 4475e1a 12203->12205 12204 4475e9d 12209 4475eb1 12204->12209 12210 4475efb 12204->12210 12251 429e5b4 12205->12251 12208 426c50c 26 API calls 12211 4475e48 12208->12211 12279 435cbe4 12209->12279 12215 435cbe4 50 API calls 12210->12215 12257 4473e94 12211->12257 12214 4475e59 12216 426c24c 16 API calls 12214->12216 12219 4475f3a 12215->12219 12218 4475e74 12216->12218 12217 4475ed3 12217->11865 12218->11865 12219->11865 12221 4476950 12220->12221 12222 447699d 12221->12222 12223 428be58 46 API calls 12221->12223 12224 44769c8 12222->12224 12225 428be58 46 API calls 12222->12225 12226 4476998 12223->12226 12230 426c24c 16 API calls 12224->12230 12227 44769c3 12225->12227 12228 426a390 4 API calls 12226->12228 12229 426a390 4 API calls 12227->12229 12228->12222 12229->12224 12231 4476a2e 12230->12231 12232 429e5b4 50 API calls 12231->12232 12233 4476a39 12232->12233 12234 426c50c 26 API calls 12233->12234 12235 4476a56 12234->12235 12236 426c24c 16 API calls 12235->12236 12237 4475dae 12236->12237 12238 426c50c 12237->12238 12239 426c69b 12238->12239 12242 426c531 12238->12242 12239->12197 12241 426b168 3 API calls 12241->12242 12242->12239 12242->12241 12243 426c878 26 API calls 12242->12243 12244 426c50c 26 API calls 12242->12244 12291 426fd4c 12242->12291 12243->12242 12244->12242 12247 44754f6 12245->12247 12246 447558e 12246->12199 12247->12246 12366 4292fdc 12247->12366 12249 4475583 12370 4292e14 12249->12370 12252 429e5bc 12251->12252 12253 429e5da 12252->12253 12254 428be58 46 API calls 12252->12254 12253->12208 12255 429e5d5 12254->12255 12256 426a390 4 API calls 12255->12256 12256->12253 12258 4473eb0 12257->12258 12259 4473ec4 12258->12259 12260 4473ed3 12258->12260 12426 4292d04 12259->12426 12262 4292d04 52 API calls 12260->12262 12263 4473ece 12262->12263 12264 4292e14 72 API calls 12263->12264 12265 4473f1a 12264->12265 12265->12214 12267 428d6f1 12266->12267 12272 428d77c 12267->12272 12276 428d711 12267->12276 12432 4284cc0 12267->12432 12271 428d749 12271->12272 12273 4284cc0 CharUpperBuffW 12271->12273 12274 428d866 12272->12274 12278 428d7d4 12272->12278 12273->12272 12274->12276 12277 426d280 26 API calls 12274->12277 12276->12204 12277->12274 12278->12276 12440 4290e60 12278->12440 12282 435cc1c 12279->12282 12290 435cc0e 12279->12290 12280 435cc7c 12456 435d670 12280->12456 12282->12280 12283 428be58 46 API calls 12282->12283 12285 435cc58 12282->12285 12282->12290 12284 435cc53 12283->12284 12286 426a390 4 API calls 12284->12286 12285->12280 12287 428be58 46 API calls 12285->12287 12286->12285 12288 435cc77 12287->12288 12289 426a390 4 API calls 12288->12289 12289->12280 12290->12217 12292 426fd5e 12291->12292 12293 426fd20 14 API calls 12292->12293 12294 426fd73 12293->12294 12297 426fcb4 12294->12297 12296 426fd8a 12296->12242 12298 426fce7 12297->12298 12299 426fcbf 12297->12299 12298->12296 12301 426f8f4 12299->12301 12302 426f910 12301->12302 12303 426f918 12301->12303 12313 426f790 12302->12313 12305 426f634 13 API calls 12303->12305 12306 426f940 12305->12306 12308 426f983 12306->12308 12324 426f6fc 12306->12324 12309 426f69c 2 API calls 12308->12309 12311 426f9a4 12309->12311 12311->12298 12314 426f845 12313->12314 12315 426f7a9 12313->12315 12314->12303 12316 426f7ba 12315->12316 12335 42697d0 12315->12335 12339 426992c 12316->12339 12319 426f818 12357 4269ac4 12319->12357 12323 426f7e9 12323->12319 12354 426f620 12323->12354 12325 426f704 12324->12325 12326 426f70d 12325->12326 12362 426f1cc 12325->12362 12328 426f4b0 12326->12328 12329 426f4ca 12328->12329 12330 426f4d3 12329->12330 12332 426f4ed 12329->12332 12331 426d280 26 API calls 12330->12331 12333 426f4e8 12331->12333 12332->12333 12334 426d280 26 API calls 12332->12334 12333->12308 12334->12333 12336 42697d9 12335->12336 12338 42697de 12335->12338 12337 42696a4 GetModuleHandleW GetProcAddress GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation 12336->12337 12337->12338 12338->12316 12347 426993a 12339->12347 12340 4269db8 GetCurrentThreadId GetCurrentThreadId 12340->12347 12341 4269988 12341->12323 12342 4269963 GetTickCount 12342->12347 12343 42699d5 GetTickCount 12343->12341 12343->12347 12344 4269a0c GetTickCount 12346 4269b24 Sleep 12344->12346 12345 426997b GetTickCount 12345->12341 12345->12347 12351 4269a1c 12346->12351 12347->12340 12347->12341 12347->12342 12347->12343 12347->12344 12347->12345 12348 42699aa GetCurrentThreadId 12347->12348 12349 42695e8 Sleep Sleep SwitchToThread 12347->12349 12348->12341 12349->12347 12350 4269a36 GetTickCount 12350->12351 12351->12344 12351->12350 12352 4269aa0 12351->12352 12352->12341 12353 4269aa6 GetCurrentThreadId 12352->12353 12353->12341 12355 42697d0 GetModuleHandleW GetProcAddress GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation 12354->12355 12356 426f628 12355->12356 12356->12323 12358 42697b8 GetCurrentThreadId 12357->12358 12359 4269acf 12358->12359 12360 4269b24 Sleep 12359->12360 12361 4269afb 12359->12361 12360->12361 12361->12303 12363 426f1d7 12362->12363 12364 42697d0 GetModuleHandleW GetProcAddress GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation 12363->12364 12365 426f1de 12364->12365 12365->12326 12367 4292ff1 12366->12367 12368 4292fe5 12366->12368 12367->12249 12394 42933f0 12368->12394 12373 4292e31 12370->12373 12371 4292e55 12372 4292e7d 12371->12372 12374 428bf28 72 API calls 12371->12374 12375 4292ea5 12372->12375 12378 428bf28 72 API calls 12372->12378 12373->12371 12376 428be58 46 API calls 12373->12376 12377 4292e78 12374->12377 12383 4292eda 12375->12383 12386 428bf28 72 API calls 12375->12386 12379 4292e50 12376->12379 12381 426a390 4 API calls 12377->12381 12382 4292ea0 12378->12382 12380 426a390 4 API calls 12379->12380 12380->12371 12381->12372 12385 426a390 4 API calls 12382->12385 12408 42926c4 12383->12408 12385->12375 12387 4292ed5 12386->12387 12388 426a390 4 API calls 12387->12388 12388->12383 12390 428be58 46 API calls 12391 4292f04 12390->12391 12392 426a390 4 API calls 12391->12392 12393 4292f09 12392->12393 12393->12246 12395 42933f6 12394->12395 12398 42930d8 12395->12398 12397 4293414 12397->12367 12399 42930e4 12398->12399 12400 42930fe 12399->12400 12401 42930f4 GetACP 12399->12401 12402 4293101 GetCPInfo 12400->12402 12401->12402 12403 429311e 12402->12403 12404 4293135 12402->12404 12405 428be58 46 API calls 12403->12405 12404->12397 12406 4293130 12405->12406 12407 426a390 4 API calls 12406->12407 12407->12404 12409 42926d5 12408->12409 12411 42926f0 12408->12411 12409->12411 12413 428be58 46 API calls 12409->12413 12410 429271d 12412 4292745 12410->12412 12415 428bf28 72 API calls 12410->12415 12411->12410 12414 428bf28 72 API calls 12411->12414 12419 429277b 12412->12419 12423 428bf28 72 API calls 12412->12423 12416 42926eb 12413->12416 12417 4292718 12414->12417 12418 4292740 12415->12418 12420 426a390 4 API calls 12416->12420 12421 426a390 4 API calls 12417->12421 12422 426a390 4 API calls 12418->12422 12419->12390 12419->12393 12420->12411 12421->12410 12422->12412 12424 4292776 12423->12424 12425 426a390 4 API calls 12424->12425 12425->12419 12427 4292d1e 12426->12427 12428 4292d0e 12426->12428 12427->12263 12429 42933f0 52 API calls 12428->12429 12431 4292d1c 12428->12431 12430 4292d51 12429->12430 12430->12263 12431->12263 12434 4284ccf 12432->12434 12433 4284cf0 12436 4284cf4 12433->12436 12434->12433 12435 4284cea CharUpperBuffW 12434->12435 12435->12433 12437 4284d01 12436->12437 12438 4284d2c 12437->12438 12439 4284d26 CharLowerBuffW 12437->12439 12438->12271 12439->12438 12443 4290fdc 12440->12443 12446 4290e84 12443->12446 12447 4290eaf 12446->12447 12448 4290e96 12446->12448 12450 4290f38 CompareStringW 12447->12450 12452 4290f38 12448->12452 12451 4290e7d 12450->12451 12451->12278 12453 4290f51 12452->12453 12454 4290fab CompareStringW 12453->12454 12455 4290f73 12453->12455 12454->12455 12455->12451 12459 435d140 12456->12459 12458 435d677 12458->12290 12460 435d154 12459->12460 12464 435d17e 12459->12464 12461 428be58 46 API calls 12460->12461 12460->12464 12462 435d179 12461->12462 12463 426a390 4 API calls 12462->12463 12463->12464 12464->12458 12466 44736b1 12465->12466 12467 428be58 46 API calls 12466->12467 12468 44736ca 12466->12468 12467->12468 12469 4473658 12468->12469 12470 4473672 12469->12470 12471 447368b 12470->12471 12472 428be58 46 API calls 12470->12472 12471->11895 12472->12471 12474 44735f5 12473->12474 12475 428be58 46 API calls 12474->12475 12476 4473629 12474->12476 12475->12476 12476->11874 12484 4267238 12477->12484 12479 44585e8 12479->11657 12481 4457aaa 12480->12481 12483 4457ab7 12481->12483 12489 4457990 PeekMessageW 12481->12489 12483->11664 12485 426724c 12484->12485 12486 4267250 GetModuleFileNameW 12485->12486 12487 426726e GetCommandLineW 12485->12487 12488 426726c 12486->12488 12487->12488 12488->12479 12490 44579b1 12489->12490 12495 4457a92 12489->12495 12491 44579b7 IsWindowUnicode 12490->12491 12492 44579c1 12490->12492 12491->12492 12493 44579d2 PeekMessageW 12492->12493 12494 44579e8 PeekMessageA 12492->12494 12496 44579fc 12493->12496 12494->12496 12495->12481 12496->12495 12510 445982c GetCapture 12496->12510 12498 4457a37 12498->12495 12517 4457824 12498->12517 12507 4457a75 TranslateMessage 12508 4457a82 DispatchMessageW 12507->12508 12509 4457a8a DispatchMessageA 12507->12509 12508->12495 12509->12495 12511 4459841 12510->12511 12513 4459852 12510->12513 12511->12513 12545 4393e70 12511->12545 12513->12498 12514 445985d 12514->12513 12515 4459863 GetParent 12514->12515 12516 4393e70 7 API calls 12514->12516 12515->12513 12515->12514 12516->12514 12518 445784f 12517->12518 12519 4457838 12517->12519 12518->12495 12521 44576dc 12518->12521 12519->12518 12558 4458e0c 12519->12558 12522 4457726 12521->12522 12523 44576ec 12521->12523 12522->12495 12525 445772c 12522->12525 12523->12522 12524 4457713 TranslateMDISysAccel 12523->12524 12524->12522 12526 4457747 12525->12526 12527 445781a 12525->12527 12526->12527 12528 4457752 GetCapture 12526->12528 12527->12495 12540 4457694 12527->12540 12529 44577dc GetWindowThreadProcessId GetWindowThreadProcessId 12528->12529 12533 445775d 12528->12533 12529->12527 12530 44577fd SendMessageW 12529->12530 12530->12527 12531 44577b9 12530->12531 12531->12527 12534 445778e 12533->12534 12536 4457777 GetParent 12533->12536 12537 445776e 12533->12537 12709 4393ecc 12533->12709 12535 4457794 IsWindowUnicode 12534->12535 12534->12537 12538 44577bd SendMessageA 12535->12538 12539 445779e SendMessageW 12535->12539 12536->12533 12537->12535 12538->12527 12538->12531 12539->12527 12539->12531 12541 44576a5 IsWindowUnicode 12540->12541 12542 44576d9 12540->12542 12543 44576c6 IsDialogMessageA 12541->12543 12544 44576b1 IsDialogMessageW 12541->12544 12542->12495 12542->12507 12543->12542 12544->12542 12546 4393e7b GetWindowThreadProcessId 12545->12546 12553 4393ec2 12545->12553 12547 4393e86 GetCurrentProcessId 12546->12547 12546->12553 12548 4393e90 12547->12548 12547->12553 12549 4393e9a GlobalFindAtomW 12548->12549 12550 4393ea9 GetPropW 12549->12550 12551 4393ebb 12549->12551 12550->12553 12554 4393e3c GetCurrentProcessId GetWindowThreadProcessId 12551->12554 12553->12514 12555 4393e69 12554->12555 12556 4393e53 12554->12556 12555->12553 12556->12555 12557 4393e58 SendMessageW 12556->12557 12557->12555 12559 4458e22 12558->12559 12560 4458e39 12558->12560 12566 4458d98 12559->12566 12560->12518 12562 4458e29 12575 44556d4 12562->12575 12567 4458da6 12566->12567 12574 4458df8 12566->12574 12568 4458dbc IsWindowVisible 12567->12568 12567->12574 12569 4458dc6 12568->12569 12568->12574 12570 4458dfa 12569->12570 12571 4458dd8 12569->12571 12587 4458ba4 12570->12587 12573 4458de5 ShowWindow 12571->12573 12573->12574 12574->12562 12576 44556e0 UnhookWindowsHookEx 12575->12576 12577 44556eb 12575->12577 12576->12577 12578 4455752 12577->12578 12579 445570c SetEvent GetCurrentThreadId 12577->12579 12584 4458be4 12578->12584 12580 4455749 CloseHandle 12579->12580 12582 4455724 12579->12582 12580->12578 12581 4455730 MsgWaitForMultipleObjects 12581->12580 12581->12582 12582->12581 12593 4457abc 12582->12593 12585 4458c01 12584->12585 12586 4458bf1 KillTimer 12584->12586 12585->12560 12586->12585 12588 4458be4 KillTimer 12587->12588 12589 4458bb4 SetTimer 12588->12589 12590 4458be0 12589->12590 12591 4458bd9 12589->12591 12590->12574 12592 4458e0c 128 API calls 12591->12592 12592->12590 12594 4457990 129 API calls 12593->12594 12595 4457acb 12594->12595 12596 4457ad8 12595->12596 12598 4458764 12595->12598 12596->12581 12618 44586d8 GetCursorPos 12598->12618 12601 4458e0c 126 API calls 12602 44587ad 12601->12602 12621 44589c0 12602->12621 12604 44587cf 12605 445881d GetCurrentThreadId 12604->12605 12606 4458815 12604->12606 12607 445881f 12604->12607 12609 445889f 12605->12609 12610 4458898 12605->12610 12626 4458674 12606->12626 12607->12605 12615 445883b SetTimer 12607->12615 12613 44588b2 12609->12613 12614 44588ad WaitMessage 12609->12614 12632 432396c 12610->12632 12613->12596 12614->12613 12615->12605 12616 4458862 12615->12616 12617 4458674 74 API calls 12616->12617 12617->12605 12663 43959e4 12618->12663 12623 44589d4 12621->12623 12622 44589ea 12622->12604 12623->12622 12668 43c5204 12623->12668 12625 4458a08 12625->12604 12629 4458681 12626->12629 12627 44586d4 12627->12605 12629->12627 12630 44586ab IsWindowVisible 12629->12630 12631 44586bc IsWindowEnabled 12629->12631 12672 44545e8 12629->12672 12630->12629 12631->12629 12633 4323980 12632->12633 12634 4323989 12632->12634 12633->12609 12675 4324038 12634->12675 12637 43239c7 12639 43239d4 12637->12639 12640 43239cb 12637->12640 12638 4324038 78 API calls 12641 43239a0 12638->12641 12690 4323938 ResetEvent 12639->12690 12686 4323944 WaitForSingleObject 12640->12686 12644 428bf28 72 API calls 12641->12644 12645 43239c2 12644->12645 12646 426a390 4 API calls 12645->12646 12646->12637 12647 43239d2 12691 4269ba4 12647->12691 12649 43239ed 12650 426992c 13 API calls 12649->12650 12652 43239f5 12650->12652 12651 4323b62 12651->12609 12652->12651 12695 430f720 12652->12695 12656 4323a5c 12703 4269b0c 12656->12703 12658 4323a66 12659 4269ba4 5 API calls 12658->12659 12660 4323b17 12659->12660 12661 426992c 13 API calls 12660->12661 12662 4323b1f 12661->12662 12662->12609 12664 43959b0 9 API calls 12663->12664 12666 43959f8 12664->12666 12665 4395a1e 12665->12601 12665->12602 12666->12665 12667 439d49c 72 API calls 12666->12667 12667->12665 12669 43c520a 12668->12669 12670 437cf04 76 API calls 12669->12670 12671 43c521f 12670->12671 12671->12625 12673 430f720 72 API calls 12672->12673 12674 44545f8 12673->12674 12674->12629 12676 427144c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12675->12676 12677 432403e 12676->12677 12679 4322134 78 API calls 12677->12679 12685 4324092 12677->12685 12678 427144c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12680 432398e 12678->12680 12684 4324053 12679->12684 12680->12637 12680->12638 12681 4334f30 72 API calls 12682 432408d 12681->12682 12683 427144c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12682->12683 12683->12685 12684->12681 12685->12678 12687 4323957 12686->12687 12688 432395c 12686->12688 12689 4323938 ResetEvent 12687->12689 12688->12647 12689->12688 12690->12647 12692 4269bac 12691->12692 12693 42697d0 GetModuleHandleW GetProcAddress GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation 12692->12693 12694 4269bc2 12692->12694 12693->12694 12694->12649 12696 430f73c 12695->12696 12697 430f72d 12695->12697 12699 430f594 12696->12699 12698 430f634 72 API calls 12697->12698 12698->12696 12700 430f59f 12699->12700 12701 430f634 72 API calls 12700->12701 12702 430f5b3 12700->12702 12701->12702 12702->12656 12704 4269b14 12703->12704 12705 4269ba4 GetModuleHandleW GetProcAddress GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation 12704->12705 12706 4269b1b 12705->12706 12707 4269ac4 GetCurrentThreadId Sleep 12706->12707 12708 4269b20 12707->12708 12708->12658 12710 4393e70 7 API calls 12709->12710 12711 4393ed6 12710->12711 12711->12533 12712 4271df4 12713 4271e9b 12712->12713 12714 4271e1a 12712->12714 12714->12713 12716 4271a04 12714->12716 12717 4271a2f 12716->12717 12718 4271aa0 RaiseException 12717->12718 12719 4271ac8 12717->12719 12736 4271b35 12718->12736 12720 4271b5d LoadLibraryA 12719->12720 12721 4271b68 12719->12721 12726 4271bfe 12719->12726 12719->12736 12720->12721 12724 4271bb7 12721->12724 12725 4271b6c GetLastError 12721->12725 12722 4271c67 12723 4271c6b GetLastError 12722->12723 12722->12736 12728 4271c7c 12723->12728 12732 4271bc5 12724->12732 12733 4271bf8 FreeLibrary 12724->12733 12729 4271b7d 12725->12729 12726->12722 12727 4271c5b GetProcAddress 12726->12727 12726->12736 12727->12722 12730 4271c8e RaiseException 12728->12730 12728->12736 12729->12724 12731 4271b8f RaiseException 12729->12731 12730->12736 12731->12736 12732->12726 12734 4271bcb LocalAlloc 12732->12734 12733->12726 12734->12726 12735 4271bdb 12734->12735 12735->12726 12736->12714 12737 44b0898 12740 42719b8 12737->12740 12739 44b08a8 12741 42719c3 12740->12741 12744 426a6f8 12741->12744 12745 426a707 12744->12745 12746 426a70c GetCurrentThreadId 12744->12746 12745->12746 12747 426a742 12746->12747 12748 426aa44 12747->12748 12749 426a7b5 12747->12749 12750 426aa60 12748->12750 12751 426aa71 12748->12751 12763 426a68c 12749->12763 12767 426a9ac 12750->12767 12753 426aa7a GetCurrentThreadId 12751->12753 12758 426aa87 12751->12758 12753->12758 12756 426aa6a 12756->12751 12757 4266f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12757->12758 12758->12757 12759 426ab17 FreeLibrary 12758->12759 12760 426ab3f 12758->12760 12759->12758 12761 426ab4e ExitProcess 12760->12761 12762 426ab48 12760->12762 12762->12761 12764 426a6d4 12763->12764 12765 426a69c 12763->12765 12764->12739 12765->12764 12773 42702f4 GetSystemInfo 12765->12773 12768 426a9b6 GetStdHandle WriteFile 12767->12768 12769 426aa13 12767->12769 12774 426b5b8 12768->12774 12769->12756 12772 426aa03 GetStdHandle WriteFile 12772->12756 12773->12765 12775 426b5be 12774->12775 12775->12772 12776 4457990 PeekMessageW 12777 44579b1 12776->12777 12782 4457a92 12776->12782 12778 44579b7 IsWindowUnicode 12777->12778 12779 44579c1 12777->12779 12778->12779 12780 44579d2 PeekMessageW 12779->12780 12781 44579e8 PeekMessageA 12779->12781 12783 44579fc 12780->12783 12781->12783 12783->12782 12784 445982c 9 API calls 12783->12784 12785 4457a37 12784->12785 12785->12782 12786 4457824 122 API calls 12785->12786 12787 4457a44 12786->12787 12787->12782 12788 44576dc TranslateMDISysAccel 12787->12788 12789 4457a57 12788->12789 12789->12782 12790 445772c 15 API calls 12789->12790 12791 4457a64 12790->12791 12791->12782 12792 4457694 3 API calls 12791->12792 12793 4457a71 12792->12793 12793->12782 12794 4457a75 TranslateMessage 12793->12794 12795 4457a82 DispatchMessageW 12794->12795 12796 4457a8a DispatchMessageA 12794->12796 12795->12782 12796->12782 12797 42659b0 12798 4265c10 12797->12798 12799 42659c8 12797->12799 12800 4265bd4 12798->12800 12801 4265d28 12798->12801 12808 42659da 12799->12808 12813 4265a65 Sleep 12799->12813 12810 4265bee Sleep 12800->12810 12811 4265c2e 12800->12811 12802 4265d31 12801->12802 12803 426575c VirtualAlloc 12801->12803 12805 4265797 12803->12805 12806 4265787 12803->12806 12804 42659e9 12821 4265710 12806->12821 12808->12804 12809 4265ac8 12808->12809 12815 4265aa9 Sleep 12808->12815 12820 4265ad4 12809->12820 12826 4265694 12809->12826 12810->12811 12812 4265c04 Sleep 12810->12812 12816 4265694 VirtualAlloc 12811->12816 12817 4265c4c 12811->12817 12812->12800 12813->12808 12814 4265a7b Sleep 12813->12814 12814->12799 12815->12809 12819 4265abf Sleep 12815->12819 12816->12817 12819->12808 12822 4265758 12821->12822 12823 4265719 12821->12823 12822->12805 12823->12822 12824 4265724 Sleep 12823->12824 12824->12822 12825 426573e Sleep 12824->12825 12825->12823 12830 4265628 12826->12830 12828 426569d VirtualAlloc 12829 42656b4 12828->12829 12829->12820 12831 42655c8 12830->12831 12831->12828 12832 4269ffa 12837 426a0dd 12832->12837 12838 426a00d 12832->12838 12833 426a080 12834 426a0b0 RtlUnwind 12833->12834 12835 426a09b UnhandledExceptionFilter 12833->12835 12836 427144c 4 API calls 12834->12836 12835->12834 12835->12837 12836->12837 12838->12833 12838->12837 12839 426a060 UnhandledExceptionFilter 12838->12839 12839->12837 12840 426a075 12839->12840 12840->12834 12841 4268c7b 12846 4268bd4 12841->12846 12843 4268c9f 12844 4268cc0 CompareStringW 12843->12844 12845 4268ce1 12844->12845 12849 42701f4 12846->12849 12852 4270164 12849->12852 12851 4268be6 12851->12843 12853 4270185 12852->12853 12854 426ff18 MultiByteToWideChar 12853->12854 12855 42701ab 12853->12855 12854->12855 12855->12851 12856 44a7184 12857 44a7192 12856->12857 12871 4457bd4 12857->12871 12859 44a71ab 12860 4457bd4 10 API calls 12859->12860 12861 44a71be 12860->12861 12862 4457bd4 10 API calls 12861->12862 12863 44a71d1 12862->12863 12864 4457bd4 10 API calls 12863->12864 12865 44a71e4 12864->12865 12866 4457bd4 10 API calls 12865->12866 12867 44a71f7 12866->12867 12877 4457d30 12867->12877 12869 44a71fe 12870 4457aa4 129 API calls 12869->12870 12870->12869 12873 4457bee 12871->12873 12872 4457cef 12872->12859 12873->12872 12874 4457cd1 12873->12874 12875 4457ca9 GetWindowLongW SetWindowLongW 12873->12875 12890 444a980 GetWindowLongW 12874->12890 12875->12874 12879 4457d5c 12877->12879 12878 4457e29 12878->12869 12879->12878 12881 4457d77 12879->12881 12901 444f3e4 12879->12901 12882 4457ddf 12881->12882 12884 4457dc0 12881->12884 12885 4457de1 12881->12885 12882->12878 12883 4457abc 129 API calls 12882->12883 12883->12882 12905 4457120 12884->12905 12930 444d8b4 12885->12930 12891 444a999 12890->12891 12892 444a9bb IsIconic IsWindowVisible 12891->12892 12893 444aa3c 12891->12893 12894 444a9e6 ShowWindow 12892->12894 12895 444a9ee 12892->12895 12893->12872 12894->12895 12896 444a9f2 SetWindowLongW 12895->12896 12897 444aa03 SetWindowLongW 12895->12897 12898 444aa12 12896->12898 12897->12898 12898->12893 12899 444aa34 ShowWindow 12898->12899 12900 444aa2a ShowWindow 12898->12900 12899->12893 12900->12893 12902 444f41f 12901->12902 12903 444f3f2 12901->12903 12902->12881 12903->12902 12904 444f419 ShowWindow 12903->12904 12904->12902 12934 444a8fc 12905->12934 12907 445712f 12924 445718a 12907->12924 12937 4456384 12907->12937 12909 445713e 12910 4457147 SetActiveWindow 12909->12910 12911 4457153 12909->12911 12910->12911 12940 44565e0 12911->12940 12913 4457160 12914 445719b 12913->12914 12918 4457169 12913->12918 12915 4458c04 2 API calls 12914->12915 12916 44571a8 12915->12916 12917 445721b 12916->12917 12923 44571c5 IsWindowEnabled 12916->12923 12958 44557b4 12917->12958 12918->12924 12955 4458c04 IsWindowEnabled 12918->12955 12922 444f3e4 ShowWindow 12922->12924 12923->12917 12925 44571cf 12923->12925 12924->12882 12927 4452be8 12924->12927 12926 44571f4 SetWindowPos DefWindowProcW 12925->12926 12926->12924 12928 444d8b4 78 API calls 12927->12928 12929 4452bf4 12928->12929 12929->12882 12931 444d8c4 12930->12931 12932 444d8da 12930->12932 12931->12882 12932->12931 12993 444f424 12932->12993 12935 444a917 IsIconic 12934->12935 12936 444a90a 12934->12936 12935->12907 12936->12907 12966 4456284 12937->12966 12941 44565fc 12940->12941 12953 445669a 12940->12953 12942 4456604 12941->12942 12944 44566a5 12941->12944 12945 4456618 EnumWindows 12942->12945 12942->12953 12943 445670f 12948 430f720 72 API calls 12943->12948 12943->12953 12944->12943 12950 44566f8 ShowWindow 12944->12950 12944->12953 12946 4456629 12945->12946 12947 445666b 12945->12947 12979 44564d4 GetWindow 12945->12979 12946->12947 12954 4456654 ShowWindow 12946->12954 12949 430f720 72 API calls 12947->12949 12947->12953 12951 4456732 ShowOwnedPopups 12948->12951 12952 445668e ShowOwnedPopups 12949->12952 12950->12943 12950->12950 12951->12943 12951->12953 12952->12947 12952->12953 12953->12913 12954->12947 12954->12954 12956 4458c24 EnableWindow 12955->12956 12957 4457180 12955->12957 12956->12957 12957->12922 12989 4455758 SystemParametersInfoW 12958->12989 12961 44557cd ShowWindow 12963 44557df 12961->12963 12964 44557d8 12961->12964 12963->12924 12992 4455788 SystemParametersInfoW 12964->12992 12967 4456320 12966->12967 12968 4456299 12966->12968 12967->12909 12968->12967 12969 44562a2 EnumWindows 12968->12969 12969->12967 12970 44562c2 GetWindow GetWindowLongW 12969->12970 12974 44561c0 12969->12974 12971 44562df 12970->12971 12971->12967 12972 430f720 72 API calls 12971->12972 12973 4456314 SetWindowPos 12972->12973 12973->12967 12973->12971 12976 44561da 12974->12976 12975 445620a GetWindow 12977 4456216 GetWindowLongW 12975->12977 12978 4456222 12975->12978 12976->12975 12976->12978 12977->12978 12980 44564f1 12979->12980 12981 445650a 12979->12981 12980->12981 12982 44564fe GetWindowThreadProcessId 12980->12982 12983 445650f GetCurrentProcessId 12981->12983 12982->12983 12984 4456519 12983->12984 12985 4456568 IsWindowVisible 12984->12985 12988 44565a8 12984->12988 12986 4456572 12985->12986 12985->12988 12987 426d280 26 API calls 12986->12987 12987->12988 12990 4455777 12989->12990 12990->12961 12991 4455788 SystemParametersInfoW 12990->12991 12991->12961 12992->12963 12994 444f7c6 12993->12994 12995 444f43c 12993->12995 12994->12931 12995->12994 12996 444f455 12995->12996 12997 444f46a 12995->12997 13015 444ec18 12996->13015 12999 444f496 12997->12999 13001 444f481 12997->13001 13000 444f462 12999->13000 13032 44559b0 12999->13032 13004 444ec18 75 API calls 13000->13004 13002 444ec18 75 API calls 13001->13002 13002->13000 13005 444f4b1 13004->13005 13039 44545b4 13005->13039 13007 44545b4 GetSystemMetrics 13014 444f4c2 13007->13014 13008 44540d4 GetMonitorInfoW 13008->13014 13009 44545a0 72 API calls 13009->13014 13010 445408c GetMonitorInfoW 13010->13014 13011 4454074 GetMonitorInfoW 13011->13014 13012 4454040 GetMonitorInfoW 13012->13014 13013 4454058 GetMonitorInfoW 13013->13014 13014->12994 13014->13007 13014->13008 13014->13009 13014->13010 13014->13011 13014->13012 13014->13013 13042 43a0d08 13015->13042 13017 444ec29 MonitorFromWindow 13018 44545b4 GetSystemMetrics 13017->13018 13024 444ec3b 13018->13024 13019 444ec6a 13047 4455940 13019->13047 13021 444ec74 13023 44545b4 GetSystemMetrics 13021->13023 13029 444ec7e 13023->13029 13024->13019 13025 444ec56 13024->13025 13044 44545a0 13024->13044 13026 44545a0 72 API calls 13025->13026 13027 444ec62 13026->13027 13027->13000 13028 44545a0 72 API calls 13028->13029 13029->13027 13029->13028 13030 444ec99 13029->13030 13031 44545a0 72 API calls 13030->13031 13031->13027 13054 4455960 13032->13054 13035 4455940 73 API calls 13036 44559ca 13035->13036 13037 4455960 74 API calls 13036->13037 13038 44559d0 13037->13038 13038->13000 13040 44545c6 13039->13040 13041 44545be GetSystemMetrics 13039->13041 13040->13014 13041->13014 13043 43a0d12 13042->13043 13043->13017 13045 430f720 72 API calls 13044->13045 13046 44545b0 13045->13046 13046->13024 13050 4455908 13047->13050 13051 445592e EnumDisplayMonitors 13050->13051 13053 4455918 13050->13053 13051->13021 13052 430f720 72 API calls 13052->13053 13053->13051 13053->13052 13055 44545b4 GetSystemMetrics 13054->13055 13056 4455973 13055->13056 13057 44545a0 72 API calls 13056->13057 13059 4455993 13056->13059 13061 44559a0 13056->13061 13062 4454100 GetMonitorInfoW 13056->13062 13057->13056 13060 44545a0 72 API calls 13059->13060 13060->13061 13061->13035 13061->13038 13062->13056 13063 426d658 13064 426d684 13063->13064 13065 426d668 GetModuleFileNameW 13063->13065 13066 426e8cc 44 API calls 13065->13066 13066->13064

                          Control-flow Graph

                          APIs
                          • Sleep.KERNEL32(0000012C,00000000,044A5E82), ref: 044A5E03
                          • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 044A5E20
                          • Sleep.KERNEL32(0000012C,0000012C,00000000,044A5E82), ref: 044A5E5A
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$DownloadFile
                          • String ID:
                          • API String ID: 2087964873-0
                          • Opcode ID: 3d72bced2673791fa510328df621d0639912ef95866aff0ccefa96b8d713c4d8
                          • Instruction ID: c86d1aabbb557afef1c1af55baf34b148e74205891c7b4acfd2f6fed91ea8674
                          • Opcode Fuzzy Hash: 3d72bced2673791fa510328df621d0639912ef95866aff0ccefa96b8d713c4d8
                          • Instruction Fuzzy Hash: CB111C70710604AFFB00EB69C882A8E7BA4EF4A744F504065EA05EB3A0DB74BE90DB55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0426E79C,?,?), ref: 0426E70E
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0426E79C,?,?), ref: 0426E717
                            • Part of subcall function 0426E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,0426E602,?,00000001), ref: 0426E5D7
                            • Part of subcall function 0426E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,0426E602,?,00000001), ref: 0426E5E7
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: feb0b0dbcc98d900f2ceb1281032c78ad06f0cd2e4161932587dbc8788b79618
                          • Instruction ID: 1db55dd29507449df506a232a07fd03fa15b8ecae11ee0c753c86783e9a35d30
                          • Opcode Fuzzy Hash: feb0b0dbcc98d900f2ceb1281032c78ad06f0cd2e4161932587dbc8788b79618
                          • Instruction Fuzzy Hash: 6C11B474B10209ABEF00EFA8D891AAEB7B8EF48304F5104B59806E3250DB707F448A61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,0426E602,?,00000001), ref: 0426E5D7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,0426E602,?,00000001), ref: 0426E5E7
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 9bf6e300e89898ec56282019466a5c81eb57206df2f9a114a10a07ff92bcaad8
                          • Instruction ID: 80f756dd126c5c1b9e98513c237dae6e393370604dc15775d38cce0febad3d36
                          • Opcode Fuzzy Hash: 9bf6e300e89898ec56282019466a5c81eb57206df2f9a114a10a07ff92bcaad8
                          • Instruction Fuzzy Hash: BAF0E274734654BFE710FB74DD5284EB7ACEB493187A104B0E805E3150EB34BF809924
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0426E3ED,?,?), ref: 0426E201
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0426E3ED,?,?), ref: 0426E24A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0426E3ED,?,?), ref: 0426E26C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0426E28A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0426E2A8
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0426E2C6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0426E2E4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0426E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0426E3ED), ref: 0426E324
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0426E3D0,?,80000001), ref: 0426E34F
                          • RegCloseKey.ADVAPI32(?,0426E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0426E3D0,?,80000001,Software\Embarcadero\Locales), ref: 0426E3CA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 0f5ed793560a5dc260c1f99037a331a7eedd059fb5eb4d5be6285c92fba114f2
                          • Instruction ID: c7482938020a5eb5bc50705273144d1f1b1f8430e945605644d1a1ff50b44980
                          • Opcode Fuzzy Hash: 0f5ed793560a5dc260c1f99037a331a7eedd059fb5eb4d5be6285c92fba114f2
                          • Instruction Fuzzy Hash: 8A513475B6020DBFFB10DBA4CC41FAEB7BCEB08704F514465BA06F6185DAB0BAC09A55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                            • Part of subcall function 0428EDD8: GetEnvironmentVariableW.KERNEL32(00000000,?,00000400,?,?,?,?,044A3D71,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?), ref: 0428EE01
                          • MoveFileW.KERNEL32(00000000,00000000), ref: 044A3DA0
                          • Sleep.KERNEL32(0000001E,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?,?,044A5E55,0000012C,00000000,044A5E82), ref: 044A3DA7
                            • Part of subcall function 044A21C4: ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 044A221C
                            • Part of subcall function 044A58E8: Sleep.KERNEL32(00002328,00000000,044A5927,?,?,044A3DEF,.exe,044A5E82,0000012C,0000001E,044A3E04,00000000,044A3E2C,?,?,00000000), ref: 044A58FE
                            • Part of subcall function 044A58E8: WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 044A590A
                            • Part of subcall function 044A58E8: Sleep.KERNEL32(0000012C,00002328,00000000,044A5927,?,?,044A3DEF,.exe,044A5E82,0000012C,0000001E,044A3E04,00000000,044A3E2C,?,?), ref: 044A5914
                          • Sleep.KERNEL32(0000012C,.exe,044A5E82,0000012C,0000001E,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?,?,044A5E55,0000012C), ref: 044A3DF4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$EnvironmentExecExecuteFileMoveShellVariable
                          • String ID: .exe$MpCmdRun$Obligation Feeds$\Microsoft\Crypto\Keys\bin01.zip$appdata$bin01.zip$flyer1$flyer2$flyer3
                          • API String ID: 4165743239-2642550186
                          • Opcode ID: 23eb9458c726209010fb2862ab8f554e21f9b1bf697e0b93405f1dd3fc3b7048
                          • Instruction ID: 4ea9c257b0d7f11e6021666e743b55599af37b5b957851a7a1330136670867d0
                          • Opcode Fuzzy Hash: 23eb9458c726209010fb2862ab8f554e21f9b1bf697e0b93405f1dd3fc3b7048
                          • Instruction Fuzzy Hash: 33511A74B20159AFFF00EFA8D88199EBBB5EF49308F604465E901AB354DB34BE518B50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF,?,?,00000000,00000000,00000000), ref: 0426DEB2
                          • LeaveCriticalSection.KERNEL32(044BCC14,044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF,?,?,00000000,00000000), ref: 0426DED6
                          • LeaveCriticalSection.KERNEL32(044BCC14,044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF,?,?,00000000,00000000), ref: 0426DEE5
                          • IsValidLocale.KERNEL32(00000000,00000002,044BCC14,044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF), ref: 0426DEF7
                          • EnterCriticalSection.KERNEL32(044BCC14,00000000,00000002,044BCC14,044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF), ref: 0426DF54
                          • LeaveCriticalSection.KERNEL32(044BCC14,044BCC14,00000000,00000002,044BCC14,044BCC14,00000000,0426DF98,?,?,?,00000000,?,0426E860,00000000,0426E8BF), ref: 0426DF7D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: cf72ef6486267605ca7b8ccceaa4b5557dbf2ebe1b23b3d22fa56352d2c2aea3
                          • Instruction ID: 5bf77c28e233196be914093f8c51b539ee3f9c617b6eb77fd38b7179bb644384
                          • Opcode Fuzzy Hash: cf72ef6486267605ca7b8ccceaa4b5557dbf2ebe1b23b3d22fa56352d2c2aea3
                          • Instruction Fuzzy Hash: 9C2193207302196BFF11B675988165922A69F4574CBA0446DE143DB244DEE4BCC08BF2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 134 4271a04-4271a9e call 4271eb4 call 4271ec4 call 4271ed4 call 4271ee4 * 3 147 4271aa0-4271ac3 RaiseException 134->147 148 4271ac8-4271ad5 134->148 149 4271cd8-4271cde 147->149 150 4271ad7 148->150 151 4271ada-4271afa 148->151 150->151 152 4271b0d-4271b15 151->152 153 4271afc-4271b0b call 4271ef4 151->153 155 4271b18-4271b21 152->155 153->155 157 4271b23-4271b33 155->157 158 4271b3a-4271b3c 155->158 157->158 170 4271b35 157->170 159 4271b42-4271b49 158->159 160 4271bfe-4271c08 158->160 161 4271b4b-4271b57 159->161 162 4271b59-4271b5b 159->162 163 4271c0a-4271c16 160->163 164 4271c18-4271c1a 160->164 161->162 166 4271b5d-4271b66 LoadLibraryA 162->166 167 4271b68-4271b6a 162->167 163->164 168 4271c67-4271c69 164->168 169 4271c1c-4271c20 164->169 166->167 174 4271bb7-4271bc3 call 42712f8 167->174 175 4271b6c-4271b7b GetLastError 167->175 171 4271cb1-4271cb4 168->171 172 4271c6b-4271c7a GetLastError 168->172 177 4271c22-4271c26 169->177 178 4271c5b-4271c65 GetProcAddress 169->178 179 4271cb6-4271cbd 170->179 171->179 180 4271c7c-4271c88 172->180 181 4271c8a-4271c8c 172->181 192 4271bc5-4271bc9 174->192 193 4271bf8-4271bf9 FreeLibrary 174->193 182 4271b7d-4271b89 175->182 183 4271b8b-4271b8d 175->183 177->178 186 4271c28-4271c33 177->186 178->168 184 4271cd6 179->184 185 4271cbf-4271cce 179->185 180->181 181->171 188 4271c8e-4271cae RaiseException 181->188 182->183 183->174 189 4271b8f-4271bb2 RaiseException 183->189 184->149 185->184 186->178 190 4271c35-4271c3b 186->190 188->171 189->149 190->178 196 4271c3d-4271c4a 190->196 192->160 197 4271bcb-4271bd9 LocalAlloc 192->197 193->160 196->178 198 4271c4c-4271c57 196->198 197->160 199 4271bdb-4271bf6 197->199 198->178 200 4271c59 198->200 199->160 200->171
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04271ABC
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 8d91ad48b0aa052eb17ac9c51073e61b58bdc4a840a04b7ac5792e09b3c8f90e
                          • Instruction ID: 67d217969d506e7e6d33d82b528f010a77e2f2fc02f3133b0f78221311854ea5
                          • Opcode Fuzzy Hash: 8d91ad48b0aa052eb17ac9c51073e61b58bdc4a840a04b7ac5792e09b3c8f90e
                          • Instruction Fuzzy Hash: 75A12BB5A102099FEB15DFE8D880BFEBBB5EF48310F244129E915A7380EB74A955CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • IsUserAnAdmin.SHELL32 ref: 0449D108
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0449D18A
                            • Part of subcall function 04286358: GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0449D12F,00000000,0449D1B1), ref: 0428636E
                            • Part of subcall function 04286DC8: CreateDirectoryW.KERNEL32(00000000,00000000,?,0449D13D,00000000,0449D1B1), ref: 04286DD5
                            • Part of subcall function 044A5DCC: Sleep.KERNEL32(0000012C,00000000,044A5E82), ref: 044A5E03
                            • Part of subcall function 044A5DCC: URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 044A5E20
                            • Part of subcall function 044A5DCC: Sleep.KERNEL32(0000012C,0000012C,00000000,044A5E82), ref: 044A5E5A
                          Strings
                          • C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF, xrefs: 0449D14B
                          • C:\Program Files (x86)\Microsoft.NET\ahs.zip, xrefs: 0449D15F
                          • C:\Program Files (x86)\Microsoft.NET\base, xrefs: 0449D125, 0449D133
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FileSleep$AdminAttributesCreateDirectoryDownloadMessageUser
                          • String ID: C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF$C:\Program Files (x86)\Microsoft.NET\ahs.zip$C:\Program Files (x86)\Microsoft.NET\base
                          • API String ID: 3215071381-1565531728
                          • Opcode ID: 3c2fdcb09246323d7f911df93251a6f592917acc0feeb43056c29e1fe532f1ff
                          • Instruction ID: 7574a76afc5ef052d1550dc9d73c8e2aa06bc52c4e482b71a22e0b85a8308b62
                          • Opcode Fuzzy Hash: 3c2fdcb09246323d7f911df93251a6f592917acc0feeb43056c29e1fe532f1ff
                          • Instruction Fuzzy Hash: C011B1B5B10604AFFF10FFA4CD41A9E7BE9EB09209F500062E901E7390DA39BD00AA60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 225 4457990-44579ab PeekMessageW 226 44579b1-44579b5 225->226 227 4457a99-4457aa0 225->227 228 44579c5 226->228 229 44579b7-44579bf IsWindowUnicode 226->229 231 44579c7-44579d0 228->231 229->228 230 44579c1-44579c3 229->230 230->231 232 44579d2-44579e6 PeekMessageW 231->232 233 44579e8-44579fb PeekMessageA 231->233 234 44579fc-44579fe 232->234 233->234 234->227 235 4457a04-4457a0a 234->235 236 4457a10-4457a1c 235->236 237 4457a92 235->237 238 4457a2e-4457a39 call 445982c 236->238 239 4457a1e-4457a22 236->239 237->227 238->227 242 4457a3b-4457a46 call 4457824 238->242 239->238 242->227 245 4457a48-4457a4c 242->245 245->227 246 4457a4e-4457a59 call 44576dc 245->246 246->227 249 4457a5b-4457a66 call 445772c 246->249 249->227 252 4457a68-4457a73 call 4457694 249->252 252->227 255 4457a75-4457a80 TranslateMessage 252->255 256 4457a82-4457a88 DispatchMessageW 255->256 257 4457a8a-4457a90 DispatchMessageA 255->257 256->227 257->227
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 044579A4
                          • IsWindowUnicode.USER32 ref: 044579B8
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 044579DB
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 044579F1
                          • TranslateMessage.USER32 ref: 04457A76
                          • DispatchMessageW.USER32 ref: 04457A83
                          • DispatchMessageA.USER32 ref: 04457A8B
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                          • String ID:
                          • API String ID: 2190272339-0
                          • Opcode ID: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                          • Instruction ID: 454193750ed5413f146ff24c763e1b42e24bf3c36afbf587a50c495dedd08688
                          • Opcode Fuzzy Hash: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                          • Instruction Fuzzy Hash: 9821F86435470276FF316AA91C04BBF57894FC2709F14847BEC81D73A3D6A6B9164222
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 258 4286358-4286378 call 426b8b4 GetFileAttributesW 261 428637e-4286384 258->261 262 42863ff-4286407 GetLastError 258->262 265 4286394-4286398 261->265 266 4286386-428638f 261->266 263 4286429-428642b 262->263 264 4286409-428640c 262->264 268 428642f-4286436 263->268 264->263 267 428640e-4286413 264->267 269 42863c8-42863ce 265->269 270 428639a-42863b5 CreateFileW 265->270 266->268 267->263 271 4286415-4286418 267->271 273 42863d0-42863d2 269->273 274 42863d4-42863ef CreateFileW 269->274 270->268 272 42863b7-42863c6 CloseHandle 270->272 271->263 275 428641a-428641d 271->275 272->268 273->268 276 42863fb-42863fd 274->276 277 42863f1-42863f9 CloseHandle 274->277 275->263 278 428641f-4286422 275->278 276->268 277->268 278->263 279 4286424-4286427 278->279 279->263 280 428642d 279->280 280->268
                          APIs
                          • GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0449D12F,00000000,0449D1B1), ref: 0428636E
                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0449D12F,00000000,0449D1B1), ref: 042863AD
                          • CloseHandle.KERNEL32(00000000,00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0449D12F,00000000), ref: 042863B8
                          • GetLastError.KERNEL32(00000000,?,?,?,?,?,0449D12F,00000000,0449D1B1), ref: 042863FF
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: File$AttributesCloseCreateErrorHandleLast
                          • String ID:
                          • API String ID: 2927643983-0
                          • Opcode ID: 3c2ab4a0b07557caa07350c4ae0cdbfad4d8a0bb4ce679d3e52bff24e37af557
                          • Instruction ID: f14f8f5263a70036da614619a2b78936892e64b0c2446dbb5371913bc4642b10
                          • Opcode Fuzzy Hash: 3c2ab4a0b07557caa07350c4ae0cdbfad4d8a0bb4ce679d3e52bff24e37af557
                          • Instruction Fuzzy Hash: 1E112331FBB71628FA7031290CA5B7E19498B82734F381A3DFB55EA3C0D0E4B4859111
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 281 426a6f8-426a705 282 426a707 281->282 283 426a70c-426a740 GetCurrentThreadId 281->283 282->283 284 426a744-426a770 call 426a5dc 283->284 285 426a742 283->285 288 426a772-426a774 284->288 289 426a779-426a780 284->289 285->284 288->289 290 426a776 288->290 291 426a782-426a785 289->291 292 426a78a-426a790 289->292 290->289 291->292 293 426a795-426a79c 292->293 294 426a792 292->294 295 426a79e-426a7a5 293->295 296 426a7ab-426a7af 293->296 294->293 295->296 297 426aa44-426aa5e 296->297 298 426a7b5 call 426a68c 296->298 299 426aa60-426aa6c call 426a924 call 426a9ac 297->299 300 426aa71-426aa78 297->300 305 426a7ba 298->305 299->300 303 426aa7a-426aa85 GetCurrentThreadId 300->303 304 426aa9b-426aa9f 300->304 303->304 307 426aa87-426aa96 call 426a5fc call 426a980 303->307 308 426aaa1-426aaa5 304->308 309 426aab9-426aabd 304->309 307->304 308->309 314 426aaa7-426aab7 308->314 310 426aabf-426aac2 309->310 311 426aac9-426aacd 309->311 310->311 315 426aac4-426aac6 310->315 316 426aacf-426aad8 call 4266f7c 311->316 317 426aaec-426aaf5 call 426a624 311->317 314->309 315->311 316->317 326 426aada-426aaea call 4268ea8 call 4266f7c 316->326 327 426aaf7-426aafa 317->327 328 426aafc-426ab01 317->328 326->317 327->328 329 426ab1d-426ab28 call 426a5fc 327->329 328->329 330 426ab03-426ab11 call 426eaec 328->330 339 426ab2d-426ab31 329->339 340 426ab2a 329->340 330->329 338 426ab13-426ab15 330->338 338->329 342 426ab17-426ab18 FreeLibrary 338->342 343 426ab33-426ab35 call 426a980 339->343 344 426ab3a-426ab3d 339->344 340->339 342->329 343->344 346 426ab56-426ab67 344->346 347 426ab3f-426ab46 344->347 346->309 348 426ab4e-426ab51 ExitProcess 347->348 349 426ab48 347->349 349->348
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 0426A72F
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: a00ba42a00ec5ded0f8b6e3dab03fd436c17294c0bce3b6cf0ae32d7f9697c37
                          • Instruction ID: 83f0dc98b60834943faa191ac61cb6d37e9e4e7f57e72e56284076b33ae9c9d4
                          • Opcode Fuzzy Hash: a00ba42a00ec5ded0f8b6e3dab03fd436c17294c0bce3b6cf0ae32d7f9697c37
                          • Instruction Fuzzy Hash: 90519C707206069FEB24DF68D48479A77F5EB0A318F14856AE847AB241C778FCC4CBA5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 350 4269ffa-426a007 351 426a120-426a125 350->351 352 426a00d-426a019 350->352 353 426a01b-426a029 call 4268bb0 352->353 354 426a089-426a090 352->354 353->351 362 426a02f-426a033 353->362 355 426a092-426a099 354->355 356 426a0b0-426a0d8 RtlUnwind call 427144c 354->356 355->356 358 426a09b-426a0ae UnhandledExceptionFilter 355->358 361 426a0dd-426a0fe call 4269f64 356->361 358->351 358->356 361->351 362->351 366 426a039-426a047 362->366 367 426a080-426a086 366->367 368 426a049-426a055 call 4269f14 366->368 367->354 368->367 371 426a057-426a05e 368->371 371->367 372 426a060-426a06f UnhandledExceptionFilter 371->372 372->351 373 426a075-426a07e 372->373 373->356
                          APIs
                          • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 0426A066
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,Function_00009FFC), ref: 0426A0A3
                          • RtlUnwind.KERNEL32(?,?,Function_00009FFC,00000000,?,?,Function_00009FFC,?), ref: 0426A0CE
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$Unwind
                          • String ID:
                          • API String ID: 1141220122-0
                          • Opcode ID: 56a2c51270bbd9377c4f32904ee65f0fdf360957c5d5ad5cc3b2506d162a30e9
                          • Instruction ID: 489d79036d15c3fbd911ad0f28dc31bf0879aabf8d9e0896ab9e4c94b8139e0c
                          • Opcode Fuzzy Hash: 56a2c51270bbd9377c4f32904ee65f0fdf360957c5d5ad5cc3b2506d162a30e9
                          • Instruction Fuzzy Hash: 7D318FB0728301AFE720DF14E994F27B7E9EB89754F198598E40697250C735FCC0CA61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 393 4457bd4-4457bec 394 4457bff-4457c01 393->394 395 4457bee-4457bfd call 42692b4 393->395 397 4457c05-4457c79 394->397 395->394 399 4457c03 395->399 403 4457cef-4457d03 397->403 404 4457c7b-4457c8b call 4269194 397->404 399->397 405 4457d05-4457d15 call 4269194 403->405 406 4457d21 403->406 404->403 410 4457c8d-4457ca7 call 43a0ce4 404->410 405->406 413 4457d17-4457d1a 405->413 415 4457cd1-4457cea call 444a980 410->415 416 4457ca9-4457ccc GetWindowLongW SetWindowLongW 410->416 413->406 415->403 416->415
                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 04457CB5
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04457CCC
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID:
                          • API String ID: 1378638983-0
                          • Opcode ID: 6236ba363cdaacf2df9fd5774e7b8b5a93fee58624223c2f50f8be8e28f408b6
                          • Instruction ID: 1b516e00d0bfc9dabae40c69eb42e6fe5d57042cdd4fac1158ceb438e9a45209
                          • Opcode Fuzzy Hash: 6236ba363cdaacf2df9fd5774e7b8b5a93fee58624223c2f50f8be8e28f408b6
                          • Instruction Fuzzy Hash: 95411A34A04248EFEF05DF68D884A9EB7F6EB49314F6185B6EC11A7362D734AE41DB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,0426E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0426E946,00000000,?,00000105), ref: 0426E853
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,0426E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0426E946,00000000,?,00000105), ref: 0426E87B
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 4f2378a8bdc8985473eadeadd2606f7ea70158f38772bc218be70b4810db32d7
                          • Instruction ID: 60affae50a7e2ec117a3bf02044453a3a89eed47a7bc96dc7695ab0fed26b5b7
                          • Opcode Fuzzy Hash: 4f2378a8bdc8985473eadeadd2606f7ea70158f38772bc218be70b4810db32d7
                          • Instruction Fuzzy Hash: 2B312D38F202199FEF10EF98C884AAEB7B5EF48304F514465D416A7260DBB4BDC1CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0426E986,?,04260000,044B1C1C), ref: 0426E908
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0426E986,?,04260000,044B1C1C), ref: 0426E959
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: 6964f1df0aa429420633caa491d7839a066227ac8cb069edf2e86fb5df4841e0
                          • Instruction ID: cdf890f8f7b44c35f67d2fa49a576e5889a816ab984c94d0ae2e7eae25e7a0c6
                          • Opcode Fuzzy Hash: 6964f1df0aa429420633caa491d7839a066227ac8cb069edf2e86fb5df4841e0
                          • Instruction Fuzzy Hash: E4116D74B5021CABEB24EE64C885BDEB3B8DB04704F5104A6A409A3290EA706EC48E94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 498 428a7e4-428a7f3 499 428a7fb-428a81b FormatMessageW 498->499 500 428a7f5 498->500 501 428a81e-428a820 499->501 500->499 502 428a822-428a82e 501->502 503 428a836-428a859 call 426ae9c LocalFree 501->503 504 428a81d 502->504 505 428a830-428a834 502->505 504->501 505->503 505->504
                          APIs
                          • FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0432398E,?,04323D27,04321F94,00000004,04321F90,00000000), ref: 0428A808
                          • LocalFree.KERNEL32(00000001,0428A861,00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0432398E,?,04323D27,04321F94,00000004), ref: 0428A854
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FormatFreeLocalMessage
                          • String ID:
                          • API String ID: 1427518018-0
                          • Opcode ID: 7828e752e5896412e1c5ecf0afc04d842872e66067835ad9eea8e38bf114aca1
                          • Instruction ID: 93e1afc234fcf852f6c1db0d3f542d9daeb566b4bfcf2679ad108a415f62b556
                          • Opcode Fuzzy Hash: 7828e752e5896412e1c5ecf0afc04d842872e66067835ad9eea8e38bf114aca1
                          • Instruction Fuzzy Hash: 0001A230B602096FF729A6598C51F7E76ADE784B04FA0407EB501966C0DD75BD11CA70
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32(00000000,04316D20,?,?,042F3834,00000001), ref: 04316C5E
                            • Part of subcall function 04285EE4: CreateFileW.KERNEL32(00000000,000000F0,000000F0,00000000,00000003,00000080,00000000,00000000,?,042F3834,04316CA0,00000000,04316D20,?,?,042F3834), ref: 04285F33
                            • Part of subcall function 04286CA4: GetFullPathNameW.KERNEL32(00000000,00000104,?,?,?,00000000,?,042F3834,04316CBB,00000000,04316D20,?,?,042F3834,00000001), ref: 04286CC7
                          • GetLastError.KERNEL32(00000000,04316D20,?,?,042F3834,00000001), ref: 04316CC5
                            • Part of subcall function 0428A7E4: FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0432398E,?,04323D27,04321F94,00000004,04321F90,00000000), ref: 0428A808
                            • Part of subcall function 0428A7E4: LocalFree.KERNEL32(00000001,0428A861,00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0432398E,?,04323D27,04321F94,00000004), ref: 0428A854
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateFileFormatFreeFullLocalMessageNamePath
                          • String ID:
                          • API String ID: 503893064-0
                          • Opcode ID: 20989d8db280b379a485e2afb32f2562962b2877a8c8ca0be8a2e9a025faee47
                          • Instruction ID: 69248437a1f3b33cab27a62128fc63ed16818b99408813a9b105ac53948b65d6
                          • Opcode Fuzzy Hash: 20989d8db280b379a485e2afb32f2562962b2877a8c8ca0be8a2e9a025faee47
                          • Instruction Fuzzy Hash: 2A41B070F106488FEB04EFB9C8805EEBBB5EF49314F408179E915A7381DB797A45CAA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CompareStringW.KERNEL32(0000007F,00000001,00000000,00000000,00000000,00000000,00000000,04268CEA,?,?,?,00000000), ref: 04268CC9
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CompareString
                          • String ID:
                          • API String ID: 1825529933-0
                          • Opcode ID: 4d346c681c161e0482e3530bd9be521c869037990e31bd0b47b5660158865905
                          • Instruction ID: f38971180eba5bb9f990a30fcbd9e4ec05eeab48e89bfda705b33ca21954a2a1
                          • Opcode Fuzzy Hash: 4d346c681c161e0482e3530bd9be521c869037990e31bd0b47b5660158865905
                          • Instruction Fuzzy Hash: 68F0CDB1324614BFFB11FB789C52E5E7BECDB88708B110461F806E3250DA64BE808A20
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateFileW.KERNEL32(00000000,000000F0,000000F0,00000000,00000003,00000080,00000000,00000000,?,042F3834,04316CA0,00000000,04316D20,?,?,042F3834), ref: 04285F33
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: c2e5827375145cc410004291d0ceceb10d86c86734f6bc24ba1867af6ea36b8b
                          • Instruction ID: 154d2362e5a0f812ff3dc1d8439881579fe2bfe1ec115b1b67b783b3793db0af
                          • Opcode Fuzzy Hash: c2e5827375145cc410004291d0ceceb10d86c86734f6bc24ba1867af6ea36b8b
                          • Instruction Fuzzy Hash: 31E09BB2B615212BF620696D9C91B4E914DC7A6679F1D4235F615EB1C1C1A8EC4183A0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleFileNameW.KERNEL32(04260000,?,0000020A), ref: 0426D676
                            • Part of subcall function 0426E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0426E986,?,04260000,044B1C1C), ref: 0426E908
                            • Part of subcall function 0426E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0426E986,?,04260000,044B1C1C), ref: 0426E959
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction ID: d6f51bd4eacdf96d8868110f9ad55f97c5340ef9a8468c2e182790a45ab46acd
                          • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction Fuzzy Hash: 3AE0ED71B113159BDB14DF58D8C4A4637D4AB08754F0449A1ED1DCF246D371E95487D1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateDirectoryW.KERNEL32(00000000,00000000,?,0449D13D,00000000,0449D1B1), ref: 04286DD5
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CreateDirectory
                          • String ID:
                          • API String ID: 4241100979-0
                          • Opcode ID: cd1659e6bb9119a660b7d3b90fe12127d90e6347a176cdf5c712bc9dde36e5e5
                          • Instruction ID: 6b51ef578c99ccce3b9694e9e4ee3dfc126a3c576a2e669c56642d1d57bb14ee
                          • Opcode Fuzzy Hash: cd1659e6bb9119a660b7d3b90fe12127d90e6347a176cdf5c712bc9dde36e5e5
                          • Instruction Fuzzy Hash: BDB092A2B616401AFA0036B80CC1B2A008DA75461EF100931F606C7181E466E84C0110
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SysAllocStringLen.OLEAUT32(00000000,?), ref: 0426AD03
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: AllocString
                          • String ID:
                          • API String ID: 2525500382-0
                          • Opcode ID: 79ca62d7c2a33ec75572a5dd219f3eee2e30f94db15385c52f203ce866bf8487
                          • Instruction ID: 0302002d70f31702d6a2f1a54dbebcd8a91c4c24bafed72d88171322ec898122
                          • Opcode Fuzzy Hash: 79ca62d7c2a33ec75572a5dd219f3eee2e30f94db15385c52f203ce866bf8487
                          • Instruction Fuzzy Hash: 53B0123433820331F95020A21F00736014C0FC3789FC80450AE03E00C1FD85F4D1A035
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction ID: 6f1d4530c53430cf76dffe23aa8af45b2ecf1108aa49693de45e1784f31a7a98
                          • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction Fuzzy Hash: A2A012105084005AC804E7185C4240B31801940114FC40210645D95291EA0699E806D7
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,04265CAB,FFFFFFDC,0426597E), ref: 042656AB
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: bb21aab4798a16fb050b538135942f4b83ed2792a157319a7944f82f264a3f56
                          • Instruction ID: 491562bfe9c13d0a78f32000457bd5c6675f12b7a7a6ca519a5862a26bcfb134
                          • Opcode Fuzzy Hash: bb21aab4798a16fb050b538135942f4b83ed2792a157319a7944f82f264a3f56
                          • Instruction Fuzzy Hash: 3CF08CF2B513015BEB188F78AA407427BD4E708354F10417EE949EB684D7B8988087A0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 0426DFF5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0426E006
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 0426E106
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 0426E118
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 0426E124
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 0426E169
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: 53343ee8e60d95ee8e152fbd2772fd49c5df0f6cc88b28256d94e79999f73234
                          • Instruction ID: cc32f473ecd61575523f46ec0ffd03cd18a65704f8bfff0d8d2c6750037bd03b
                          • Opcode Fuzzy Hash: 53343ee8e60d95ee8e152fbd2772fd49c5df0f6cc88b28256d94e79999f73234
                          • Instruction Fuzzy Hash: A541A035F20619ABDB20DEA8CC84ADEB3B6AF44314F1585A4D406E3240EB74BEC5CF85
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 0444A98E
                          • IsIconic.USER32(?), ref: 0444A9BC
                          • IsWindowVisible.USER32(?), ref: 0444A9CC
                          • ShowWindow.USER32(?,00000000,00000000,?,?,?,04457CEF,?,044C01D8), ref: 0444A9E9
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0444A9FC
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0444AA0D
                          • ShowWindow.USER32(?,00000006,00000000,?,?,?,04457CEF,?,044C01D8), ref: 0444AA2D
                          • ShowWindow.USER32(?,00000005,00000000,?,?,?,04457CEF,?,044C01D8), ref: 0444AA37
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Window$LongShow$IconicVisible
                          • String ID:
                          • API String ID: 3484284227-0
                          • Opcode ID: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                          • Instruction ID: 4b7725d7bd40fee8b0334f2cb3c4608655a72f446ffe7b3c8ff093afa6b3be85
                          • Opcode Fuzzy Hash: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                          • Instruction Fuzzy Hash: 6B11EB0239E6D039FB2276251C01FAF1D944FD3369F184966F8D4F22C2C639B1069367
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 044A221C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: " start= auto$/C sc create WdCmdSvc binPath= "$cmd.exe$runas
                          • API String ID: 587946157-3037528773
                          • Opcode ID: 5628ad5e5e82ad0299a84b22f5b7405da76344fadfdb6e9bb92009b3426a2472
                          • Instruction ID: acf4e330b8a2d0198a8dafe947969055d64484cd20fb194fdbfe540f902920a6
                          • Opcode Fuzzy Hash: 5628ad5e5e82ad0299a84b22f5b7405da76344fadfdb6e9bb92009b3426a2472
                          • Instruction Fuzzy Hash: BDF0A4317543047FEB05AA94CC42B4DFBA8FB55718FB004B5AA04A2B80D6B07B50A915
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(FFFFFFF5), ref: 042679F6
                          • GetStdHandle.KERNEL32(000000F6), ref: 04267A01
                          • GetFileType.KERNEL32(00000000), ref: 04267A19
                          • GetConsoleOutputCP.KERNEL32(00000000), ref: 04267A2B
                          • GetConsoleCP.KERNEL32(00000000), ref: 04267A3C
                          • GetFileType.KERNEL32(00000000), ref: 04267B87
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ConsoleFileHandleType$Output
                          • String ID:
                          • API String ID: 393880136-0
                          • Opcode ID: 91127806557ab35638aeef7731539d4b3402629d181c3e19c44a1bc4c6ce531e
                          • Instruction ID: a43300552cd3bc0ade9b1369bc938b624d93ac4577ce851766f70432766ed8f3
                          • Opcode Fuzzy Hash: 91127806557ab35638aeef7731539d4b3402629d181c3e19c44a1bc4c6ce531e
                          • Instruction Fuzzy Hash: 42519160731201EAEB10EF68A8C476636A8EFC435CF148AA5D8578F285E774F9C4C7A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 042696B9
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 042696BF
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 042696D2
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 042696DB
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,04269752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04269706
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: c4d02cb3c2ba950363ac6a6d31306bd8697870f12c5fa73b7b1096605c7bfef6
                          • Instruction ID: bbb032dcf4ede065b23e77f4d71e2437a57e9003fa7e5ed31c27e28af0580de6
                          • Opcode Fuzzy Hash: c4d02cb3c2ba950363ac6a6d31306bd8697870f12c5fa73b7b1096605c7bfef6
                          • Instruction Fuzzy Hash: 5C1130F1F20209ABEB11DFA5D944A9DB7E8EB44304F5480E5E41697141DF74BAC0CB11
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04296E69
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04296E85
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04296EBE
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04296F3B
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04296F54
                          • VariantCopy.OLEAUT32(?), ref: 04296F89
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-3916222277
                          • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction ID: b359a1381840a1cae6f18ed8dce9364fdef5b0b51c3337a883c8718cc73b68f8
                          • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction Fuzzy Hash: BE51E875A1062A9BDF62EF58CC90AD9B3FCAF48244F0442E5E509E7211DA70AF858F61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,042659A6), ref: 04265DCA
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,042659A6), ref: 04265DE4
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: ac843cbc2d6ba24d93e5e2f73249dbf967e1b672163c3daf390863d7d1667efd
                          • Instruction ID: dad569fa7dc55658ffaef2c460665d5345fd9e0c6af5436cfc053a98e3b1efd7
                          • Opcode Fuzzy Hash: ac843cbc2d6ba24d93e5e2f73249dbf967e1b672163c3daf390863d7d1667efd
                          • Instruction Fuzzy Hash: 52711571724301AFEB25CF68E984B1ABBD4EF45714F18866AD84ACB3C1D7B4A8C1C791
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetCapture.USER32 ref: 04457752
                          • IsWindowUnicode.USER32(00000000), ref: 04457795
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 044577B0
                          • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 044577CF
                          • GetWindowThreadProcessId.USER32(00000000), ref: 044577DE
                          • GetWindowThreadProcessId.USER32(?,?), ref: 044577EF
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 0445780F
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                          • String ID:
                          • API String ID: 1994056952-0
                          • Opcode ID: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                          • Instruction ID: 700841709943d5d850dae718bb72ebb33f20e9e8d9e3caad7c062996efc67c56
                          • Opcode Fuzzy Hash: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                          • Instruction Fuzzy Hash: A2216671314B09AFEF60EE59D980F6B73DCDF04264F14887AEC99C3262EA20F8018765
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b9c91ec4fa523e7cc0ccb55f36b88c4d85f7d6f6341f7b11b25fe5d2d26610c
                          • Instruction ID: 99068fb338d5e95cc3658413bf0d4247bf85356cbd4a7e54ad662ffdc36e3a9a
                          • Opcode Fuzzy Hash: 5b9c91ec4fa523e7cc0ccb55f36b88c4d85f7d6f6341f7b11b25fe5d2d26610c
                          • Instruction Fuzzy Hash: E6C149727316015BE7149E7CEC8876EB386DBC4325F18867DE246CB385DAA8E8C5C790
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 04269DB8: GetCurrentThreadId.KERNEL32 ref: 04269DBB
                          • GetTickCount.KERNEL32 ref: 04269963
                          • GetTickCount.KERNEL32 ref: 0426997B
                          • GetCurrentThreadId.KERNEL32 ref: 042699AA
                          • GetTickCount.KERNEL32 ref: 042699D5
                          • GetTickCount.KERNEL32 ref: 04269A0C
                          • GetTickCount.KERNEL32 ref: 04269A36
                          • GetCurrentThreadId.KERNEL32 ref: 04269AA6
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: c63a58bf12c0c11561673504d172f54396d2b9cd2beb5db0d798185aa6e1f217
                          • Instruction ID: fb48df82154a595f70282a9016727277d8e7d85f26a22ae73eff568fe6dff212
                          • Opcode Fuzzy Hash: c63a58bf12c0c11561673504d172f54396d2b9cd2beb5db0d798185aa6e1f217
                          • Instruction Fuzzy Hash: 89418FB13293429EE721EE7CC48432EBBD1AF81354F048A2CD4DAC7284EE75A8C0C752
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ShellExecuteExW.SHELL32(?), ref: 0449CF42
                          • WaitForSingleObject.KERNEL32(?,000000FF,00000000,0449CFB0,?,00000000,0449CFD5,?,?,?,?), ref: 0449CF51
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 0449CF73
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 0449CF85
                          • CloseHandle.KERNEL32(?,00000001,?,00000000,000000FF,000004FF,00000001,?,00000000,000000FF,000004FF,?,000000FF,00000000,0449CFB0), ref: 0449CF95
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Wait$CloseCodeExecuteExitHandleMultipleObjectObjectsProcessShellSingle
                          • String ID: runas
                          • API String ID: 1089270204-4000483414
                          • Opcode ID: 394ec86ed32887073883c622ce16a63dfe7517d561c15953cda77d0be6a8e430
                          • Instruction ID: 9ddb5883156c21c0c4c0ed71e901a0e9003922b0f59454ef78c125e06448a231
                          • Opcode Fuzzy Hash: 394ec86ed32887073883c622ce16a63dfe7517d561c15953cda77d0be6a8e430
                          • Instruction Fuzzy Hash: 05316D70A142049FEF15EF69C880A4ABBF8EB48314F508566E905DB399EB34FD45DF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,044B08A8,00000000,?,0426AA6A,?,?,044BCB9C,044BCB9C,?,?,044B1C38,04271A03,044B08A8), ref: 0426A9E5
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,044B08A8,00000000,?,0426AA6A,?,?,044BCB9C,044BCB9C,?,?,044B1C38,04271A03), ref: 0426A9EB
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,044B08A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,044B08A8,00000000,?,0426AA6A,?,?,044BCB9C), ref: 0426AA06
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,044B08A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,044B08A8,00000000,?,0426AA6A,?,?), ref: 0426AA0C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: 83c4803d122eefebd2974844d695e26be056b566b28467ede6176797e60179cc
                          • Instruction ID: d1c5f36514e0efb9cef725ed9d80cfe7f2f2025066d2c0193832795cb1e1c625
                          • Opcode Fuzzy Hash: 83c4803d122eefebd2974844d695e26be056b566b28467ede6176797e60179cc
                          • Instruction Fuzzy Hash: 96F09CA07A43857BFB10AB946C16F99255CDB46B15F640106B291750C4DEB878C497B1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0426629A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 042662A0
                          • GetStdHandle.KERNEL32(000000F4,042653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 042662BF
                          • WriteFile.KERNEL32(00000000,000000F4,042653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 042662C5
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,042653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 042662DC
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,042653E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 042662E2
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID:
                          • API String ID: 3320372497-0
                          • Opcode ID: c0cdd6bdf794f1759d9e550245ba6c3d6aaa6d8b33eda62e6b97ad60d6a1f3d7
                          • Instruction ID: 7a6657acbe6081cfb431c3de2e1b8b87088086299ecbd981b075285ff4265d5c
                          • Opcode Fuzzy Hash: c0cdd6bdf794f1759d9e550245ba6c3d6aaa6d8b33eda62e6b97ad60d6a1f3d7
                          • Instruction Fuzzy Hash: 020144953746247EF210F6B8AC84F6F6A8C9F19A68F500625B21AD60C6CD64BCC483F1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,FFFFFFDC,0426597E), ref: 04265A67
                          • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,0426597E), ref: 04265A7D
                          • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,0426597E), ref: 04265AAB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,0426597E), ref: 04265AC1
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 877d3442044785e15d4e8de6084be316a973046f4e7bbc421600b535ee3fadbe
                          • Instruction ID: b2787f097fd85a58859c61d035e55fa1417438dd6d3fb1f21deb156cdce5ac85
                          • Opcode Fuzzy Hash: 877d3442044785e15d4e8de6084be316a973046f4e7bbc421600b535ee3fadbe
                          • Instruction Fuzzy Hash: 03C126727216529FEB19CF28F584315BBD1EB89314F18826ED0569B384D3B4B8C1CBE0
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(044564D4,00000000), ref: 0445661E
                          • ShowWindow.USER32(?,00000000,044564D4,00000000), ref: 04456660
                          • ShowOwnedPopups.USER32(00000000,?), ref: 0445668F
                          • ShowWindow.USER32(?,00000005), ref: 04456704
                          • ShowOwnedPopups.USER32(00000000,?), ref: 04456733
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Show$OwnedPopupsWindow$EnumWindows
                          • String ID:
                          • API String ID: 315437064-0
                          • Opcode ID: 589da462b1e14b5871de6ccfb6d1a5d2ddd6f8bb74d39eb0291cee48fe68fc61
                          • Instruction ID: 7fe4254a3f5984f458a0e5123a733fb6703adde34ec4de5bffe66c704c90d993
                          • Opcode Fuzzy Hash: 589da462b1e14b5871de6ccfb6d1a5d2ddd6f8bb74d39eb0291cee48fe68fc61
                          • Instruction Fuzzy Hash: 33413E30700B418FEF20DF28C484B6B73E6FB84368F56496AD869872A2C774F885DB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,044A3D3A,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?,?,044A5E55), ref: 042868C8
                          • GetLastError.KERNEL32(00000000,?,?,?,?,044A3D3A,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?,?,044A5E55), ref: 042868D7
                          • GetFileAttributesW.KERNEL32(00000000,00000000,?,?,?,?,044A3D3A,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?), ref: 042868DF
                          • RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,?,?,?,?,044A3D3A,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?), ref: 042868FA
                          • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,044A3D3A,044A3E04,00000000,044A3E2C,?,?,00000000,00000000,?), ref: 04286908
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorFileLast$AttributesDeleteDirectoryRemove
                          • String ID:
                          • API String ID: 2814369299-0
                          • Opcode ID: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                          • Instruction ID: 144946eda7498048ae52f9202e78b785fb7e9a523ce47c80de87794978f49add
                          • Opcode Fuzzy Hash: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                          • Instruction Fuzzy Hash: 8BF0E5513726991DBE303A7C0C84E7E214CDA826BDB040639FE55C71D1D926780EC266
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhookWindowsHookEx.USER32(00000000), ref: 044556E6
                          • SetEvent.KERNEL32(00000000), ref: 04455712
                          • GetCurrentThreadId.KERNEL32 ref: 04455717
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 04455740
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 0445574D
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                          • String ID:
                          • API String ID: 2132507429-0
                          • Opcode ID: 9d133e9082f3ca7ad927b4cfdc74949251d9652714522cef2cc8821cf53c560b
                          • Instruction ID: cb5857246f6ba6d3813459820661d2b985b902f873707d38ab276d93887e7d4c
                          • Opcode Fuzzy Hash: 9d133e9082f3ca7ad927b4cfdc74949251d9652714522cef2cc8821cf53c560b
                          • Instruction Fuzzy Hash: 0801A230654701EFFF50EFA4D940B2AB3E4EB00329F04852AA868C72E5DB39B840CF12
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00002328,00000000,044A5927,?,?,044A3DEF,.exe,044A5E82,0000012C,0000001E,044A3E04,00000000,044A3E2C,?,?,00000000), ref: 044A58FE
                          • WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 044A590A
                          • Sleep.KERNEL32(0000012C,00002328,00000000,044A5927,?,?,044A3DEF,.exe,044A5E82,0000012C,0000001E,044A3E04,00000000,044A3E2C,?,?), ref: 044A5914
                          Strings
                          • C:\WINDOWS\system32\shutdown.exe -r -t 1 -f, xrefs: 044A5905
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$Exec
                          • String ID: C:\WINDOWS\system32\shutdown.exe -r -t 1 -f
                          • API String ID: 1325486322-941748481
                          • Opcode ID: 635f389b49c2aba702e2cbc499c56dce722e3ddd22ca548f2bb22f9ce40caacc
                          • Instruction ID: 75631e2301d320f20855288ab513d2616b5f98f4ef26f83063ea2bfc76325333
                          • Opcode Fuzzy Hash: 635f389b49c2aba702e2cbc499c56dce722e3ddd22ca548f2bb22f9ce40caacc
                          • Instruction Fuzzy Hash: 61D01274354700BAF6127B655D13B2A7A4CD359F64FA20865F600A99D1D8B534209866
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0426DD89
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0426DDE7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0426DE44
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0426DE77
                            • Part of subcall function 0426DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0426DDF5), ref: 0426DD4B
                            • Part of subcall function 0426DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0426DDF5), ref: 0426DD68
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 1db025692ae795f05793502b8bb412ae2ce6d603942a9fe12d1d0bb828e7775a
                          • Instruction ID: b2275e2d10fca789e9227f2724856a01e4223993b7b4dd1c2fe953386e0643a5
                          • Opcode Fuzzy Hash: 1db025692ae795f05793502b8bb412ae2ce6d603942a9fe12d1d0bb828e7775a
                          • Instruction Fuzzy Hash: B9314031B2011E9BEB10EFA8C884AEEB7B4FF58304F504569D552E7291DB74AA85CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindow.USER32(?,00000004), ref: 044564E6
                          • GetWindowThreadProcessId.USER32(?,?), ref: 04456503
                          • GetCurrentProcessId.KERNEL32(?,00000004), ref: 0445650F
                          • IsWindowVisible.USER32(?), ref: 04456569
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Window$Process$CurrentThreadVisible
                          • String ID:
                          • API String ID: 3926708836-0
                          • Opcode ID: 015374572fcd59fb8384fd95a457d4539022269692bdf6f0e9b5564b545ac341
                          • Instruction ID: 8ae4aa723fdcb518d3a8be46cf64699b307bffc665c31bb9c9d8cd58e5e4e3fb
                          • Opcode Fuzzy Hash: 015374572fcd59fb8384fd95a457d4539022269692bdf6f0e9b5564b545ac341
                          • Instruction Fuzzy Hash: 01312A31640319ABEF50DF99E4C4BAA73A4EB14324F4941B5DC08A7356DF35FE408B50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetActiveWindow.USER32(?,?,044C01D8,04457DC8), ref: 0445714E
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction ID: ab022cd99804cb0cee8a650883510a55563a7dab6ba409aceb215ba472d6384b
                          • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction Fuzzy Hash: 1F3108707402409BEF54EE69D8C4B9A37A6AF04308F0844B6BD09DF3ABDA74F885C761
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(044561C0), ref: 044562B1
                          • GetWindow.USER32(00000003,00000003), ref: 044562C9
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 044562D6
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 04456315
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Window$EnumLongWindows
                          • String ID:
                          • API String ID: 4191631535-0
                          • Opcode ID: 2f8b4763f835e2712ec2454b73db9f4f8f408ea6faa04c02fc320e1ed091de73
                          • Instruction ID: fa48f29cbee8f9d1052902a083cfa34a04e42ac0b54fe522000de6b34df372f2
                          • Opcode Fuzzy Hash: 2f8b4763f835e2712ec2454b73db9f4f8f408ea6faa04c02fc320e1ed091de73
                          • Instruction Fuzzy Hash: 0E11A030704700AFEF10AA288884F9A7794DF05720F5581B9FD989F2E2C770A845CB66
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowThreadProcessId.USER32(00000000), ref: 04393E7D
                          • GetCurrentProcessId.KERNEL32(?,?,00000000,0445985D,?,?,?,00000001,04457A37), ref: 04393E86
                          • GlobalFindAtomW.KERNEL32(00000000), ref: 04393E9B
                          • GetPropW.USER32(00000000,00000000), ref: 04393EB2
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                          • String ID:
                          • API String ID: 2582817389-0
                          • Opcode ID: 5e393a84cbb94f544d72159d68bbf87cc1f1eff19c05b8423721d7d9a38fc6be
                          • Instruction ID: 3504d9cacaf35aa327219e39b7838114d8fe2520d90aa34a96ff8a6976f30f85
                          • Opcode Fuzzy Hash: 5e393a84cbb94f544d72159d68bbf87cc1f1eff19c05b8423721d7d9a38fc6be
                          • Instruction Fuzzy Hash: 62F037B3B1052367BF21B6F69C8482F75CCCB085B83051425FD05C7142D639EC458675
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 0000000B.00000002.2286542223.0000000004261000.00000020.00000001.01000000.00000003.sdmp, Offset: 04260000, based on PE: true
                          • Associated: 0000000B.00000002.2286524476.0000000004260000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286542223.000000000427C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286962326.00000000044B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2286987625.00000000044B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287007107.00000000044B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287035742.00000000044BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287063061.00000000044C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287149576.00000000044C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000B.00000002.2287169203.00000000044C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_11_2_4260000_rundll32.jbxd
                          Similarity
                          • API ID: AllocValue
                          • String ID: XAv
                          • API String ID: 1189806713-3454667863
                          • Opcode ID: bd58f82483ae07421cc00603079246f8d7b0de3ed36087bd3a80cdeeb1ead1d0
                          • Instruction ID: 46dd0f12e2593a07529e208f05d4543f4a516f5398a61ba5d9142f351b2f6bf9
                          • Opcode Fuzzy Hash: bd58f82483ae07421cc00603079246f8d7b0de3ed36087bd3a80cdeeb1ead1d0
                          • Instruction Fuzzy Hash: 9BC012B0B2124147FB10FBB4951116E61A4EF40284B0004149144C6700DF38E8708B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:3.9%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:751
                          Total number of Limit Nodes:16
                          execution_graph 11602 647184 11603 647192 11602->11603 11617 5f7bd4 11603->11617 11605 6471ab 11606 5f7bd4 10 API calls 11605->11606 11607 6471be 11606->11607 11608 5f7bd4 10 API calls 11607->11608 11609 6471d1 11608->11609 11610 5f7bd4 10 API calls 11609->11610 11611 6471e4 11610->11611 11612 5f7bd4 10 API calls 11611->11612 11613 6471f7 11612->11613 11623 5f7d30 11613->11623 11615 6471fe 11636 5f7aa4 11615->11636 11618 5f7bee 11617->11618 11619 5f7cef 11618->11619 11620 5f7ca9 GetWindowLongW SetWindowLongW 11618->11620 11621 5f7cd1 11618->11621 11619->11605 11620->11621 11640 5ea980 GetWindowLongW 11621->11640 11625 5f7d5c 11623->11625 11624 5f7e29 11624->11615 11625->11624 11626 5f7d77 11625->11626 11651 5ef3e4 11625->11651 11628 5f7ddf 11626->11628 11630 5f7dc0 11626->11630 11631 5f7de1 11626->11631 11628->11624 11684 5f7abc 11628->11684 11655 5f7120 11630->11655 11680 5ed8b4 11631->11680 11637 5f7aaa 11636->11637 11638 5f7990 128 API calls 11637->11638 11639 5f7ab7 11637->11639 11638->11637 11639->11615 11641 5ea999 11640->11641 11642 5ea9bb IsIconic IsWindowVisible 11641->11642 11643 5eaa3c 11641->11643 11644 5ea9ee 11642->11644 11645 5ea9e6 ShowWindow 11642->11645 11643->11619 11646 5ea9f2 SetWindowLongW 11644->11646 11647 5eaa03 SetWindowLongW 11644->11647 11645->11644 11648 5eaa12 11646->11648 11647->11648 11648->11643 11649 5eaa2a ShowWindow 11648->11649 11650 5eaa34 ShowWindow 11648->11650 11649->11643 11650->11643 11652 5ef41f 11651->11652 11653 5ef3f2 11651->11653 11652->11626 11653->11652 11654 5ef419 ShowWindow 11653->11654 11654->11652 11689 5ea8fc 11655->11689 11657 5f712f 11666 5f718a 11657->11666 11692 5f6384 11657->11692 11659 5f713e 11660 5f7147 SetActiveWindow 11659->11660 11661 5f7153 11659->11661 11660->11661 11695 5f65e0 11661->11695 11663 5f7160 11664 5f719b 11663->11664 11668 5f7169 11663->11668 11665 5f8c04 2 API calls 11664->11665 11672 5f71a8 11665->11672 11666->11628 11677 5f2be8 11666->11677 11667 5f721b 11713 5f57b4 11667->11713 11668->11666 11710 5f8c04 IsWindowEnabled 11668->11710 11672->11667 11674 5f71c5 IsWindowEnabled 11672->11674 11673 5ef3e4 ShowWindow 11673->11666 11674->11667 11675 5f71cf 11674->11675 11676 5f71f4 SetWindowPos DefWindowProcW 11675->11676 11676->11666 11678 5ed8b4 77 API calls 11677->11678 11679 5f2bf4 11678->11679 11679->11628 11681 5ed8da 11680->11681 11682 5ed8c4 11680->11682 11681->11682 11892 5ef424 11681->11892 11682->11628 11962 5f7990 PeekMessageW 11684->11962 11687 5f7ad8 11687->11628 11690 5ea90a 11689->11690 11691 5ea917 IsIconic 11689->11691 11690->11657 11691->11657 11721 5f6284 11692->11721 11696 5f65fc 11695->11696 11709 5f669a 11695->11709 11697 5f6604 11696->11697 11699 5f66a5 11696->11699 11700 5f6618 EnumWindows 11697->11700 11697->11709 11698 5f670f 11703 4af720 71 API calls 11698->11703 11698->11709 11699->11698 11704 5f66f8 ShowWindow 11699->11704 11699->11709 11701 5f666b 11700->11701 11702 5f6629 11700->11702 11779 5f64d4 GetWindow 11700->11779 11706 4af720 71 API calls 11701->11706 11701->11709 11702->11701 11707 5f6654 ShowWindow 11702->11707 11705 5f6732 ShowOwnedPopups 11703->11705 11704->11698 11704->11704 11705->11698 11705->11709 11708 5f668e ShowOwnedPopups 11706->11708 11707->11701 11707->11707 11708->11701 11708->11709 11709->11663 11711 5f7180 11710->11711 11712 5f8c24 EnableWindow 11710->11712 11711->11673 11712->11711 11888 5f5758 SystemParametersInfoW 11713->11888 11716 5f57cd ShowWindow 11718 5f57df 11716->11718 11719 5f57d8 11716->11719 11718->11666 11891 5f5788 SystemParametersInfoW 11719->11891 11722 5f6299 11721->11722 11723 5f6320 11721->11723 11722->11723 11724 5f62a2 EnumWindows 11722->11724 11723->11659 11724->11723 11725 5f62c2 GetWindow GetWindowLongW 11724->11725 11774 5f61c0 11724->11774 11726 5f62df 11725->11726 11726->11723 11729 4af720 11726->11729 11730 4af73c SetWindowPos 11729->11730 11731 4af72d 11729->11731 11730->11723 11730->11726 11733 4af634 11731->11733 11738 410240 11733->11738 11735 4af672 11743 42bd60 11735->11743 11737 4af681 11737->11737 11740 410248 11738->11740 11739 410295 11739->11735 11740->11739 11747 40d6a0 11740->11747 11742 410284 LoadStringW 11742->11739 11744 42bd6c 11743->11744 11762 427288 11744->11762 11746 42bd99 11746->11737 11748 40d6cd 11747->11748 11749 40d6ae 11747->11749 11748->11742 11749->11748 11752 40d658 11749->11752 11753 40d684 11752->11753 11754 40d668 GetModuleFileNameW 11752->11754 11753->11742 11756 40e8cc GetModuleFileNameW 11754->11756 11757 40e91a 11756->11757 11758 40e7a8 42 API calls 11757->11758 11759 40e946 11758->11759 11760 40e958 LoadLibraryExW 11759->11760 11761 40e960 11759->11761 11760->11761 11761->11753 11765 4272b0 11762->11765 11768 4272e0 11765->11768 11767 4272a8 11767->11746 11769 4272e9 11768->11769 11770 427198 71 API calls 11769->11770 11772 427349 11769->11772 11770->11772 11771 4273b0 11771->11767 11772->11771 11773 427198 71 API calls 11772->11773 11773->11772 11776 5f61da 11774->11776 11775 5f620a GetWindow 11777 5f6216 GetWindowLongW 11775->11777 11778 5f6222 11775->11778 11776->11775 11776->11778 11777->11778 11780 5f650a 11779->11780 11781 5f64f1 11779->11781 11783 5f650f GetCurrentProcessId 11780->11783 11781->11780 11782 5f64fe GetWindowThreadProcessId 11781->11782 11782->11783 11784 5f6519 11783->11784 11785 5f65a8 11784->11785 11786 5f6568 IsWindowVisible 11784->11786 11786->11785 11787 5f6572 11786->11787 11789 40d280 11787->11789 11792 40cfd8 11789->11792 11791 40d28a 11791->11785 11793 40cffb 11792->11793 11794 40d016 11792->11794 11793->11791 11795 40d084 11794->11795 11797 40d151 11794->11797 11802 40d0eb 11795->11802 11803 40cf94 11795->11803 11797->11802 11820 40cab8 11797->11820 11799 40cfd8 25 API calls 11799->11802 11800 40d09c 11800->11802 11813 40c990 11800->11813 11802->11793 11802->11799 11824 41144c 11803->11824 11805 40cf9d 11806 40cfa5 11805->11806 11808 40cfb3 11805->11808 11807 41144c 4 API calls 11806->11807 11809 40cfaa 11807->11809 11810 41144c 4 API calls 11808->11810 11809->11800 11811 40cfc1 11810->11811 11812 41144c 4 API calls 11811->11812 11812->11809 11814 40c9ac 11813->11814 11815 40c9f0 11813->11815 11814->11815 11816 40ca59 11814->11816 11817 40ca2a 11814->11817 11815->11802 11816->11815 11839 40c6b4 11816->11839 11817->11815 11818 40c990 25 API calls 11817->11818 11818->11817 11821 40cac1 11820->11821 11822 40cac9 11820->11822 11864 40c878 11821->11864 11822->11802 11825 411481 TlsGetValue 11824->11825 11826 41145b 11824->11826 11827 411466 11825->11827 11828 41148b 11825->11828 11826->11805 11832 411380 11827->11832 11828->11805 11830 41146b TlsGetValue 11831 41147a 11830->11831 11831->11805 11833 411386 11832->11833 11834 4113aa 11833->11834 11838 41136c LocalAlloc 11833->11838 11834->11830 11836 4113a6 11836->11834 11837 4113b6 TlsSetValue 11836->11837 11837->11834 11838->11836 11840 40c853 11839->11840 11844 40c6d7 11839->11844 11840->11816 11841 40c990 25 API calls 11841->11844 11842 40c6b4 25 API calls 11842->11844 11844->11840 11844->11841 11844->11842 11846 40fd4c 11844->11846 11852 40fd20 11844->11852 11847 40fd5e 11846->11847 11848 40fd20 14 API calls 11847->11848 11849 40fd73 11848->11849 11856 40fcb4 11849->11856 11851 40fd8a 11851->11844 11853 40fd45 11852->11853 11854 40fd2b 11852->11854 11853->11844 11860 40fcec 11854->11860 11857 40fce7 11856->11857 11858 40fcbf 11856->11858 11857->11851 11859 40f8f4 25 API calls 11858->11859 11859->11857 11861 40fcf0 11860->11861 11862 40fcfd 11860->11862 11863 40f9cc 14 API calls 11861->11863 11862->11853 11863->11862 11865 40c88d 11864->11865 11869 40c8aa 11864->11869 11866 40c892 11865->11866 11867 40c8de 11865->11867 11866->11869 11870 40c8a1 11866->11870 11871 40c91d 11866->11871 11867->11869 11874 40b168 11867->11874 11869->11822 11870->11869 11881 40c50c 11870->11881 11871->11869 11872 40c878 25 API calls 11871->11872 11872->11871 11875 40acf4 11874->11875 11876 40b18f 11874->11876 11875->11874 11877 40ad5c 11875->11877 11880 40b17f SysReAllocStringLen 11875->11880 11876->11867 11878 40ad70 11877->11878 11879 40ad62 SysFreeString 11877->11879 11878->11867 11879->11878 11880->11875 11880->11876 11882 40c69b 11881->11882 11885 40c531 11881->11885 11882->11870 11883 40fd4c 25 API calls 11883->11885 11884 40b168 2 API calls 11884->11885 11885->11882 11885->11883 11885->11884 11886 40c878 25 API calls 11885->11886 11887 40c50c 25 API calls 11885->11887 11886->11885 11887->11885 11889 5f5777 11888->11889 11889->11716 11890 5f5788 SystemParametersInfoW 11889->11890 11890->11716 11891->11718 11893 5ef43c 11892->11893 11894 5ef7c6 11892->11894 11893->11894 11895 5ef46a 11893->11895 11896 5ef455 11893->11896 11894->11682 11898 5ef496 11895->11898 11900 5ef481 11895->11900 11914 5eec18 11896->11914 11899 5ef462 11898->11899 11931 5f59b0 11898->11931 11903 5eec18 74 API calls 11899->11903 11901 5eec18 74 API calls 11900->11901 11901->11899 11904 5ef4b1 11903->11904 11938 5f45b4 11904->11938 11906 5f45b4 GetSystemMetrics 11911 5ef4c2 11906->11911 11907 5f45a0 71 API calls 11907->11911 11908 5f40d4 GetMonitorInfoW 11908->11911 11909 5f4074 GetMonitorInfoW 11909->11911 11910 5f4040 GetMonitorInfoW 11910->11911 11911->11894 11911->11906 11911->11907 11911->11908 11911->11909 11911->11910 11912 5f408c GetMonitorInfoW 11911->11912 11913 5f4058 GetMonitorInfoW 11911->11913 11912->11911 11913->11911 11941 540d08 11914->11941 11916 5eec29 MonitorFromWindow 11917 5f45b4 GetSystemMetrics 11916->11917 11922 5eec3b 11917->11922 11918 5eec6a 11946 5f5940 11918->11946 11921 5eec74 11923 5f45b4 GetSystemMetrics 11921->11923 11922->11918 11924 5eec56 11922->11924 11943 5f45a0 11922->11943 11927 5eec7e 11923->11927 11925 5f45a0 71 API calls 11924->11925 11930 5eec62 11925->11930 11926 5f45a0 71 API calls 11926->11927 11927->11926 11928 5eec99 11927->11928 11927->11930 11929 5f45a0 71 API calls 11928->11929 11929->11930 11930->11899 11953 5f5960 11931->11953 11934 5f59d0 11934->11899 11935 5f5940 72 API calls 11936 5f59ca 11935->11936 11937 5f5960 73 API calls 11936->11937 11937->11934 11939 5f45be GetSystemMetrics 11938->11939 11940 5f45c6 11938->11940 11939->11911 11940->11911 11942 540d12 11941->11942 11942->11916 11944 4af720 71 API calls 11943->11944 11945 5f45b0 11944->11945 11945->11922 11949 5f5908 11946->11949 11950 5f592e EnumDisplayMonitors 11949->11950 11952 5f5918 11949->11952 11950->11921 11951 4af720 71 API calls 11951->11952 11952->11950 11952->11951 11954 5f45b4 GetSystemMetrics 11953->11954 11956 5f5973 11954->11956 11955 5f59a0 11955->11934 11955->11935 11956->11955 11957 5f45a0 71 API calls 11956->11957 11959 5f5993 11956->11959 11961 5f4100 GetMonitorInfoW 11956->11961 11957->11956 11960 5f45a0 71 API calls 11959->11960 11960->11955 11961->11956 11963 5f7a92 11962->11963 11964 5f79b1 11962->11964 11963->11687 11983 5f8764 11963->11983 11965 5f79b7 IsWindowUnicode 11964->11965 11966 5f79c1 11964->11966 11965->11966 11967 5f79e8 PeekMessageA 11966->11967 11968 5f79d2 PeekMessageW 11966->11968 11969 5f79fc 11967->11969 11968->11969 11969->11963 12003 5f982c GetCapture 11969->12003 11971 5f7a37 11971->11963 12010 5f7824 11971->12010 11980 5f7a75 TranslateMessage 11981 5f7a8a DispatchMessageA 11980->11981 11982 5f7a82 DispatchMessageW 11980->11982 11981->11963 11982->11963 12089 5f86d8 GetCursorPos 11983->12089 11986 5f8e0c 125 API calls 11987 5f87ad 11986->11987 12092 5f89c0 11987->12092 11989 5f87cf 11990 5f881d GetCurrentThreadId 11989->11990 11992 5f881f 11989->11992 11993 5f8815 11989->11993 11994 5f8898 11990->11994 11995 5f889f 11990->11995 11992->11990 11997 5f883b SetTimer 11992->11997 12097 5f8674 11993->12097 12103 4c396c 11994->12103 11999 5f88ad WaitMessage 11995->11999 12000 5f88b2 11995->12000 11997->11990 12001 5f8862 11997->12001 11999->12000 12000->11687 12002 5f8674 73 API calls 12001->12002 12002->11990 12004 5f9841 12003->12004 12008 5f9852 12003->12008 12004->12008 12038 533e70 12004->12038 12006 5f985d 12007 5f9863 GetParent 12006->12007 12006->12008 12009 533e70 7 API calls 12006->12009 12007->12006 12007->12008 12008->11971 12009->12006 12011 5f784f 12010->12011 12012 5f7838 12010->12012 12011->11963 12014 5f76dc 12011->12014 12012->12011 12051 5f8e0c 12012->12051 12015 5f76ec 12014->12015 12016 5f7726 12014->12016 12015->12016 12017 5f7713 TranslateMDISysAccel 12015->12017 12016->11963 12018 5f772c 12016->12018 12017->12016 12019 5f781a 12018->12019 12020 5f7747 12018->12020 12019->11963 12033 5f7694 12019->12033 12020->12019 12021 5f7752 GetCapture 12020->12021 12022 5f77dc GetWindowThreadProcessId GetWindowThreadProcessId 12021->12022 12026 5f775d 12021->12026 12022->12019 12023 5f77fd SendMessageW 12022->12023 12023->12019 12024 5f77b9 12023->12024 12024->12019 12027 5f778e 12026->12027 12029 5f7777 GetParent 12026->12029 12030 5f776e 12026->12030 12086 533ecc 12026->12086 12028 5f7794 IsWindowUnicode 12027->12028 12027->12030 12031 5f779e SendMessageW 12028->12031 12032 5f77bd SendMessageA 12028->12032 12029->12026 12030->12028 12031->12019 12031->12024 12032->12019 12032->12024 12034 5f76d9 12033->12034 12035 5f76a5 IsWindowUnicode 12033->12035 12034->11963 12034->11980 12036 5f76c6 IsDialogMessageA 12035->12036 12037 5f76b1 IsDialogMessageW 12035->12037 12036->12034 12037->12034 12039 533ec2 12038->12039 12040 533e7b GetWindowThreadProcessId 12038->12040 12039->12006 12040->12039 12041 533e86 GetCurrentProcessId 12040->12041 12041->12039 12042 533e90 12041->12042 12043 533e9a GlobalFindAtomW 12042->12043 12044 533ebb 12043->12044 12045 533ea9 GetPropW 12043->12045 12047 533e3c GetCurrentProcessId GetWindowThreadProcessId 12044->12047 12045->12039 12048 533e53 12047->12048 12049 533e69 12047->12049 12048->12049 12050 533e58 SendMessageW 12048->12050 12049->12039 12050->12049 12052 5f8e39 12051->12052 12053 5f8e22 12051->12053 12052->12011 12059 5f8d98 12053->12059 12055 5f8e29 12068 5f56d4 12055->12068 12060 5f8df8 12059->12060 12061 5f8da6 12059->12061 12060->12055 12061->12060 12062 5f8dbc IsWindowVisible 12061->12062 12062->12060 12063 5f8dc6 12062->12063 12064 5f8dfa 12063->12064 12065 5f8dd8 12063->12065 12080 5f8ba4 12064->12080 12067 5f8de5 ShowWindow 12065->12067 12067->12060 12069 5f56eb 12068->12069 12070 5f56e0 UnhookWindowsHookEx 12068->12070 12071 5f570c SetEvent GetCurrentThreadId 12069->12071 12072 5f5752 12069->12072 12070->12069 12073 5f5749 CloseHandle 12071->12073 12074 5f5724 12071->12074 12077 5f8be4 12072->12077 12073->12072 12075 5f5730 MsgWaitForMultipleObjects 12074->12075 12076 5f7abc 123 API calls 12074->12076 12075->12073 12075->12074 12076->12075 12078 5f8c01 12077->12078 12079 5f8bf1 KillTimer 12077->12079 12078->12052 12079->12078 12081 5f8be4 KillTimer 12080->12081 12082 5f8bb4 SetTimer 12081->12082 12083 5f8bd9 12082->12083 12084 5f8be0 12082->12084 12085 5f8e0c 127 API calls 12083->12085 12084->12060 12085->12084 12087 533e70 7 API calls 12086->12087 12088 533ed6 12087->12088 12088->12026 12134 5359e4 12089->12134 12094 5f89d4 12092->12094 12093 5f89ea 12093->11989 12094->12093 12151 565204 12094->12151 12096 5f8a08 12096->11989 12101 5f8681 12097->12101 12098 5f86d4 12098->11990 12100 5f86ab IsWindowVisible 12100->12101 12101->12098 12101->12100 12102 5f86bc IsWindowEnabled 12101->12102 12181 5f45e8 12101->12181 12102->12101 12104 4c3989 12103->12104 12105 4c3980 12103->12105 12184 4c4038 12104->12184 12105->11995 12108 4c39c7 12110 4c39cb 12108->12110 12111 4c39d4 12108->12111 12109 4c4038 77 API calls 12113 4c39a0 12109->12113 12205 4c3944 WaitForSingleObject 12110->12205 12209 4c3938 ResetEvent 12111->12209 12195 42bf28 12113->12195 12115 4c39d2 12210 409ba4 12115->12210 12117 4c39c2 12201 40a390 12117->12201 12120 4c39ed 12214 40992c 12120->12214 12123 4c3b62 12123->11995 12124 4af720 71 API calls 12125 4c3a4f 12124->12125 12229 4af594 12125->12229 12127 4c3a5c 12233 409b0c 12127->12233 12129 4c3a66 12130 409ba4 5 API calls 12129->12130 12131 4c3b17 12130->12131 12132 40992c 13 API calls 12131->12132 12133 4c3b1f 12132->12133 12133->11995 12139 5359b0 WindowFromPoint 12134->12139 12136 535a1e 12136->11986 12136->11987 12137 5359f8 12137->12136 12144 53d49c 12137->12144 12140 5359dd 12139->12140 12142 5359c4 12139->12142 12140->12137 12141 533e70 7 API calls 12141->12142 12142->12140 12142->12141 12143 5359d1 GetParent 12142->12143 12143->12140 12143->12142 12148 53d51b 12144->12148 12149 53d4bb 12144->12149 12145 53d552 12145->12136 12146 4af720 71 API calls 12146->12148 12147 4af720 71 API calls 12147->12149 12148->12145 12148->12146 12149->12147 12149->12148 12150 53d49c 71 API calls 12149->12150 12150->12149 12152 56520a 12151->12152 12155 51cf04 12152->12155 12154 56521f 12154->12096 12156 51cf0a 12155->12156 12159 4e9948 12156->12159 12158 51cf1f 12158->12154 12160 4e994e 12159->12160 12163 4c66a8 12160->12163 12162 4e9963 12162->12158 12164 4c66ae 12163->12164 12167 4c4c84 12164->12167 12166 4c66c3 12166->12162 12168 4c4c8b 12167->12168 12169 4c4cb0 12168->12169 12171 4c50e8 12168->12171 12169->12166 12172 4c510a 12171->12172 12173 4c513e 12172->12173 12174 4c51a0 54 API calls 12172->12174 12175 4c4fe4 71 API calls 12173->12175 12174->12173 12176 4c5156 12175->12176 12177 4c61f8 MultiByteToWideChar MultiByteToWideChar CompareStringW WideCharToMultiByte 12176->12177 12178 4c515f 12177->12178 12179 4c61a8 71 API calls 12178->12179 12180 4c5170 12178->12180 12179->12180 12180->12169 12182 4af720 71 API calls 12181->12182 12183 5f45f8 12182->12183 12183->12101 12185 41144c 4 API calls 12184->12185 12186 4c403e 12185->12186 12187 4c4092 12186->12187 12239 4c2134 12186->12239 12188 41144c 4 API calls 12187->12188 12190 4c398e 12188->12190 12190->12108 12190->12109 12193 41144c 4 API calls 12193->12187 12194 4c4053 12243 4d4f30 12194->12243 12196 42bf36 12195->12196 12197 410240 46 API calls 12196->12197 12198 42bf60 12197->12198 12199 427288 71 API calls 12198->12199 12200 42bf6e 12199->12200 12200->12117 12202 40a394 12201->12202 12204 40a3dc 12202->12204 12313 406fb0 12202->12313 12206 4c395c 12205->12206 12207 4c3957 12205->12207 12206->12115 12316 4c3938 ResetEvent 12207->12316 12209->12115 12211 409bac 12210->12211 12213 409bc2 12211->12213 12317 4097d0 12211->12317 12213->12120 12216 40993a 12214->12216 12217 409963 GetTickCount 12216->12217 12218 409a0c GetTickCount 12216->12218 12219 40997b GetTickCount 12216->12219 12220 4099d5 GetTickCount 12216->12220 12221 409988 12216->12221 12223 4099aa GetCurrentThreadId 12216->12223 12327 409db8 GetCurrentThreadId 12216->12327 12332 4095e8 12216->12332 12217->12216 12339 409b24 12218->12339 12219->12216 12219->12221 12220->12216 12220->12221 12221->12123 12221->12124 12223->12221 12225 409a36 GetTickCount 12226 409a1c 12225->12226 12226->12218 12226->12225 12227 409aa0 12226->12227 12227->12221 12228 409aa6 GetCurrentThreadId 12227->12228 12228->12221 12230 4af59f 12229->12230 12231 4af5b3 12230->12231 12232 4af634 71 API calls 12230->12232 12231->12127 12232->12231 12234 409b14 12233->12234 12235 409ba4 5 API calls 12234->12235 12236 409b1b 12235->12236 12343 409ac4 12236->12343 12240 4c213a 12239->12240 12257 4c3ca0 12240->12257 12242 4c2159 12242->12194 12281 4d507c 12243->12281 12245 4d4f94 12287 43ff04 12245->12287 12246 4d4f57 12246->12245 12250 4d4faa 12246->12250 12248 4d4fa8 12290 4d5120 12248->12290 12250->12248 12252 410240 46 API calls 12250->12252 12253 4d4fda 12252->12253 12254 42bd60 71 API calls 12253->12254 12255 4d4fe9 12254->12255 12256 40a390 4 API calls 12255->12256 12256->12248 12258 4c3cb2 12257->12258 12259 4c3cfa 12258->12259 12260 4c3d50 GetCurrentThread GetCurrentThreadId 12258->12260 12270 40abd4 12259->12270 12262 4c3d4e 12260->12262 12262->12242 12263 4c3d0f 12263->12262 12264 4c3d18 GetLastError 12263->12264 12274 42a7e4 12264->12274 12266 4c3d27 12267 42bf28 71 API calls 12266->12267 12268 4c3d49 12267->12268 12269 40a390 4 API calls 12268->12269 12269->12262 12271 40abf1 12270->12271 12272 40ac10 CreateThread 12271->12272 12273 40ac39 12272->12273 12279 40ab9c 12272->12279 12273->12263 12275 42a7f5 12274->12275 12276 42a7fb FormatMessageW 12274->12276 12275->12276 12277 42a81d 12276->12277 12278 42a843 LocalFree 12277->12278 12278->12266 12280 40aba4 12279->12280 12282 4d508b 12281->12282 12283 409ba4 5 API calls 12282->12283 12284 4d5093 12283->12284 12285 40992c 13 API calls 12284->12285 12286 4d509b 12285->12286 12286->12246 12293 441198 12287->12293 12289 43ff1b 12289->12248 12291 409b0c 7 API calls 12290->12291 12292 4c408d 12291->12292 12292->12193 12294 4411a8 12293->12294 12295 4411b1 12294->12295 12296 4411bb 12294->12296 12301 441158 12295->12301 12297 4411c4 12296->12297 12307 42bd18 12296->12307 12297->12289 12302 44116c 12301->12302 12303 441177 12302->12303 12304 42bd18 4 API calls 12302->12304 12310 442420 12303->12310 12304->12302 12308 40a390 4 API calls 12307->12308 12309 42bd22 12308->12309 12309->12297 12311 40cfd8 25 API calls 12310->12311 12312 441194 12311->12312 12312->12289 12314 41144c 4 API calls 12313->12314 12315 406fb5 12314->12315 12315->12204 12316->12206 12318 4097d9 12317->12318 12320 4097de 12317->12320 12321 4096a4 GetModuleHandleW GetProcAddress 12318->12321 12320->12213 12322 4096cc GetLogicalProcessorInformation 12321->12322 12326 409714 12321->12326 12323 4096db GetLastError 12322->12323 12322->12326 12324 4096e5 12323->12324 12323->12326 12325 4096ed GetLogicalProcessorInformation 12324->12325 12325->12326 12326->12320 12328 409dc5 12327->12328 12329 409dcc 12327->12329 12328->12216 12330 409de0 GetCurrentThreadId 12329->12330 12331 409df3 12329->12331 12330->12331 12331->12216 12333 4095f3 12332->12333 12334 409622 12333->12334 12335 409619 Sleep 12333->12335 12336 409641 12333->12336 12337 409631 Sleep 12334->12337 12338 40963a SwitchToThread 12334->12338 12335->12336 12336->12216 12337->12336 12338->12336 12340 409b7d 12339->12340 12342 409b36 12339->12342 12340->12226 12341 409b64 Sleep 12341->12342 12342->12340 12342->12341 12348 4097b8 GetCurrentThreadId 12343->12348 12345 409afb 12345->12129 12346 409acf 12346->12345 12347 409b24 Sleep 12346->12347 12347->12345 12349 4097c5 12348->12349 12349->12346 12350 4059b0 12351 405c10 12350->12351 12352 4059c8 12350->12352 12353 405d28 12351->12353 12354 405bd4 12351->12354 12361 4059da 12352->12361 12366 405a65 Sleep 12352->12366 12355 405d31 12353->12355 12356 40575c VirtualAlloc 12353->12356 12362 405bee Sleep 12354->12362 12364 405c2e 12354->12364 12358 405797 12356->12358 12359 405787 12356->12359 12357 4059e9 12374 405710 12359->12374 12360 405ac8 12373 405ad4 12360->12373 12379 405694 12360->12379 12361->12357 12361->12360 12367 405aa9 Sleep 12361->12367 12362->12364 12365 405c04 Sleep 12362->12365 12368 405694 VirtualAlloc 12364->12368 12372 405c4c 12364->12372 12365->12354 12366->12361 12369 405a7b Sleep 12366->12369 12367->12360 12371 405abf Sleep 12367->12371 12368->12372 12369->12352 12371->12361 12375 405758 12374->12375 12376 405719 12374->12376 12375->12358 12376->12375 12377 405724 Sleep 12376->12377 12377->12375 12378 40573e Sleep 12377->12378 12378->12376 12383 405628 12379->12383 12381 40569d VirtualAlloc 12382 4056b4 12381->12382 12382->12373 12384 4055c8 12383->12384 12384->12381 12385 411df4 12386 411e9b 12385->12386 12387 411e1a 12385->12387 12387->12386 12389 411a04 12387->12389 12390 411a2f 12389->12390 12391 411aa0 RaiseException 12390->12391 12392 411ac8 12390->12392 12408 411b35 12391->12408 12394 411b68 12392->12394 12395 411b5d LoadLibraryA 12392->12395 12396 411bfe 12392->12396 12392->12408 12393 411c67 12398 411c6b GetLastError 12393->12398 12393->12408 12399 411bb7 12394->12399 12400 411b6c GetLastError 12394->12400 12395->12394 12396->12393 12397 411c5b GetProcAddress 12396->12397 12396->12408 12397->12393 12402 411c7c 12398->12402 12405 411bc5 12399->12405 12406 411bf8 FreeLibrary 12399->12406 12401 411b7d 12400->12401 12401->12399 12403 411b8f RaiseException 12401->12403 12404 411c8e RaiseException 12402->12404 12402->12408 12403->12408 12404->12408 12405->12396 12407 411bcb LocalAlloc 12405->12407 12406->12396 12407->12396 12409 411bdb 12407->12409 12408->12387 12409->12396 12410 40d658 12411 40d684 12410->12411 12412 40d668 GetModuleFileNameW 12410->12412 12413 40e8cc 44 API calls 12412->12413 12413->12411 12414 426358 12426 40b8b4 12414->12426 12416 42636b GetFileAttributesW 12417 42637e 12416->12417 12418 4263ff GetLastError 12416->12418 12419 426386 12417->12419 12420 42639a CreateFileW 12417->12420 12421 4263c8 12417->12421 12418->12419 12420->12419 12423 4263b7 CloseHandle 12420->12423 12421->12419 12422 4263d4 CreateFileW 12421->12422 12424 4263f1 CloseHandle 12422->12424 12425 4263fb 12422->12425 12423->12419 12424->12419 12425->12419 12427 40b8ba 12426->12427 12427->12416 12428 408c7b 12433 408bd4 12428->12433 12430 408c9f 12431 408cc0 CompareStringW 12430->12431 12432 408ce1 12431->12432 12436 4101f4 12433->12436 12439 410164 12436->12439 12438 408be6 12438->12430 12440 410185 12439->12440 12442 4101ab 12440->12442 12443 40ff18 12440->12443 12442->12438 12444 40ff2d 12443->12444 12445 40ff4a 12443->12445 12446 40ff88 12444->12446 12448 40ff35 12444->12448 12445->12442 12451 4102d4 MultiByteToWideChar 12446->12451 12450 4102d4 MultiByteToWideChar 12448->12450 12450->12445 12451->12445 12452 650898 12455 4119b8 12452->12455 12454 6508a8 12456 4119c3 12455->12456 12459 40a6f8 12456->12459 12460 40a707 12459->12460 12461 40a70c GetCurrentThreadId 12459->12461 12460->12461 12462 40a742 12461->12462 12463 40aa44 12462->12463 12464 40a7b5 12462->12464 12465 40aa60 12463->12465 12466 40aa71 12463->12466 12478 40a68c 12464->12478 12482 40a9ac 12465->12482 12468 40aa7a GetCurrentThreadId 12466->12468 12473 40aa87 12466->12473 12468->12473 12471 40aa6a 12471->12466 12472 406f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12472->12473 12473->12472 12474 40ab17 FreeLibrary 12473->12474 12475 40ab3f 12473->12475 12474->12473 12476 40ab48 12475->12476 12477 40ab4e ExitProcess 12475->12477 12476->12477 12479 40a6d4 12478->12479 12480 40a69c 12478->12480 12479->12454 12480->12479 12488 4102f4 GetSystemInfo 12480->12488 12483 40aa13 12482->12483 12484 40a9b6 GetStdHandle WriteFile 12482->12484 12483->12471 12489 40b5b8 12484->12489 12487 40aa03 GetStdHandle WriteFile 12487->12471 12488->12480 12490 40b5be 12489->12490 12490->12487 12491 5f7990 PeekMessageW 12492 5f7a92 12491->12492 12493 5f79b1 12491->12493 12494 5f79b7 IsWindowUnicode 12493->12494 12495 5f79c1 12493->12495 12494->12495 12496 5f79e8 PeekMessageA 12495->12496 12497 5f79d2 PeekMessageW 12495->12497 12498 5f79fc 12496->12498 12497->12498 12498->12492 12499 5f982c 9 API calls 12498->12499 12500 5f7a37 12499->12500 12500->12492 12501 5f7824 121 API calls 12500->12501 12502 5f7a44 12501->12502 12502->12492 12503 5f76dc TranslateMDISysAccel 12502->12503 12504 5f7a57 12503->12504 12504->12492 12505 5f772c 15 API calls 12504->12505 12506 5f7a64 12505->12506 12506->12492 12507 5f7694 3 API calls 12506->12507 12508 5f7a71 12507->12508 12508->12492 12509 5f7a75 TranslateMessage 12508->12509 12510 5f7a8a DispatchMessageA 12509->12510 12511 5f7a82 DispatchMessageW 12509->12511 12510->12492 12511->12492

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040E79C,?,?), ref: 0040E70E
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040E79C,?,?), ref: 0040E717
                            • Part of subcall function 0040E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,0040E602,?,00000001), ref: 0040E5D7
                            • Part of subcall function 0040E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,0040E602,?,00000001), ref: 0040E5E7
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 1f6e36aa185c652523092eb0941dc0441a37e40d5a79af7b109eeb79e7c539c8
                          • Instruction ID: 1521c12d98e88c02ce4e97b7da46f2c4cf5f53fde21cfe8a738bb2b61bc2f0a8
                          • Opcode Fuzzy Hash: 1f6e36aa185c652523092eb0941dc0441a37e40d5a79af7b109eeb79e7c539c8
                          • Instruction Fuzzy Hash: 63118770A00209ABDB04EFA6D892AAEB3B5EF44304F50447BB504B76D2D77C6E14DB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 381 40e5a4-40e5e4 call 40adf8 call 40b8b4 FindFirstFileW 386 40e5e6-40e5e7 FindClose 381->386 387 40e5ec-40e601 call 40ad14 381->387 386->387
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,0040E602,?,00000001), ref: 0040E5D7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,0040E602,?,00000001), ref: 0040E5E7
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 72a1b8aea15378f9202b4fdcc74362d1051dfbfa213856e7d2720065714b70c4
                          • Instruction ID: 236e10ae356d36c5b77179bf1b4238c471c7490630b31aaa227146d080fcd7f5
                          • Opcode Fuzzy Hash: 72a1b8aea15378f9202b4fdcc74362d1051dfbfa213856e7d2720065714b70c4
                          • Instruction Fuzzy Hash: E2F0BE71914614AFC710FBB6DC1794FB7ACEB883147A008B6F800F26D2E6389F20992C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E3ED,?,?), ref: 0040E201
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED,?,?), ref: 0040E24A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED,?,?), ref: 0040E26C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040E28A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0040E2A8
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0040E2C6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0040E2E4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED), ref: 0040E324
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001), ref: 0040E34F
                          • RegCloseKey.ADVAPI32(?,0040E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001,Software\Embarcadero\Locales), ref: 0040E3CA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 6807586714eca489b6cce4ab7645e82e550bde6d8832df02d91cd193fb517829
                          • Instruction ID: 822bb4a971e66321cac87dbfacc20862d65e6e97d637e961b1a4cba8b43c2446
                          • Opcode Fuzzy Hash: 6807586714eca489b6cce4ab7645e82e550bde6d8832df02d91cd193fb517829
                          • Instruction Fuzzy Hash: F1510975A4060CBEE710E6A6CC42FAF77BCDB48704F6044BBBA04F71C1D6B899509B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000,00000000), ref: 0040DEB2
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000), ref: 0040DED6
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000), ref: 0040DEE5
                          • IsValidLocale.KERNEL32(00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DEF7
                          • EnterCriticalSection.KERNEL32(0065CC14,00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DF54
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DF7D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: f60b0f688af226c40a850fec6f59b7a5055c9c4a2b2d91d70c7d579d7fba16ac
                          • Instruction ID: 9dc58e0cee5aed313cf8ac6d093b04234b82adfd59d892b314dab79c5b81b1ae
                          • Opcode Fuzzy Hash: f60b0f688af226c40a850fec6f59b7a5055c9c4a2b2d91d70c7d579d7fba16ac
                          • Instruction Fuzzy Hash: 4621C370F007016EDB10F7BA9C02B1A2196DF85759FA1947FB405BA2C2CA7C8C4887AE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 411a04-411a9e call 411eb4 call 411ec4 call 411ed4 call 411ee4 * 3 80 411aa0-411ac3 RaiseException 67->80 81 411ac8-411ad5 67->81 82 411cd8-411cde 80->82 83 411ad7 81->83 84 411ada-411afa 81->84 83->84 85 411b0d-411b15 84->85 86 411afc-411b0b call 411ef4 84->86 87 411b18-411b21 85->87 86->87 90 411b23-411b33 87->90 91 411b3a-411b3c 87->91 90->91 101 411b35 90->101 92 411b42-411b49 91->92 93 411bfe-411c08 91->93 95 411b59-411b5b 92->95 96 411b4b-411b57 92->96 97 411c18-411c1a 93->97 98 411c0a-411c16 93->98 102 411b68-411b6a 95->102 103 411b5d-411b66 LoadLibraryA 95->103 96->95 99 411c67-411c69 97->99 100 411c1c-411c20 97->100 98->97 107 411cb1-411cb4 99->107 108 411c6b-411c7a GetLastError 99->108 104 411c22-411c26 100->104 105 411c5b-411c65 GetProcAddress 100->105 106 411cb6-411cbd 101->106 110 411bb7-411bc3 call 4112f8 102->110 111 411b6c-411b7b GetLastError 102->111 103->102 104->105 117 411c28-411c33 104->117 105->99 115 411cd6 106->115 116 411cbf-411cce 106->116 107->106 119 411c8a-411c8c 108->119 120 411c7c-411c88 108->120 127 411bc5-411bc9 110->127 128 411bf8-411bf9 FreeLibrary 110->128 113 411b8b-411b8d 111->113 114 411b7d-411b89 111->114 113->110 121 411b8f-411bb2 RaiseException 113->121 114->113 115->82 116->115 117->105 122 411c35-411c3b 117->122 119->107 124 411c8e-411cae RaiseException 119->124 120->119 121->82 122->105 126 411c3d-411c4a 122->126 124->107 126->105 130 411c4c-411c57 126->130 127->93 131 411bcb-411bd9 LocalAlloc 127->131 128->93 130->105 132 411c59 130->132 131->93 133 411bdb-411bf6 131->133 132->107 133->93
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00411ABC
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: d252f07f15a84d542ecdd5532b81461482ebaf0dc132f7805e42222139815d2c
                          • Instruction ID: a5eef740b33532c345308cc3144c95156f97c5d58eee02d19cda8f37d6941e0e
                          • Opcode Fuzzy Hash: d252f07f15a84d542ecdd5532b81461482ebaf0dc132f7805e42222139815d2c
                          • Instruction Fuzzy Hash: 2AA17475A003099FDB14CFE9D880BEEB7B5FF48311F14411AEA15A73A0E778A985CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 134 40a6f8-40a705 135 40a707 134->135 136 40a70c-40a740 GetCurrentThreadId 134->136 135->136 137 40a742 136->137 138 40a744-40a770 call 40a5dc 136->138 137->138 141 40a772-40a774 138->141 142 40a779-40a780 138->142 141->142 143 40a776 141->143 144 40a782-40a785 142->144 145 40a78a-40a790 142->145 143->142 144->145 146 40a792 145->146 147 40a795-40a79c 145->147 146->147 148 40a7ab-40a7af 147->148 149 40a79e-40a7a5 147->149 150 40aa44-40aa5e 148->150 151 40a7b5 call 40a68c 148->151 149->148 152 40aa60-40aa6c call 40a924 call 40a9ac 150->152 153 40aa71-40aa78 150->153 157 40a7ba 151->157 152->153 155 40aa7a-40aa85 GetCurrentThreadId 153->155 156 40aa9b-40aa9f 153->156 155->156 160 40aa87-40aa96 call 40a5fc call 40a980 155->160 161 40aaa1-40aaa5 156->161 162 40aab9-40aabd 156->162 160->156 161->162 165 40aaa7-40aab7 161->165 166 40aac9-40aacd 162->166 167 40aabf-40aac2 162->167 165->162 170 40aaec-40aaf5 call 40a624 166->170 171 40aacf-40aad8 call 406f7c 166->171 167->166 168 40aac4-40aac6 167->168 168->166 180 40aaf7-40aafa 170->180 181 40aafc-40ab01 170->181 171->170 179 40aada-40aaea call 408ea8 call 406f7c 171->179 179->170 180->181 183 40ab1d-40ab28 call 40a5fc 180->183 181->183 184 40ab03-40ab11 call 40eaec 181->184 192 40ab2a 183->192 193 40ab2d-40ab31 183->193 184->183 191 40ab13-40ab15 184->191 191->183 195 40ab17-40ab18 FreeLibrary 191->195 192->193 196 40ab33-40ab35 call 40a980 193->196 197 40ab3a-40ab3d 193->197 195->183 196->197 199 40ab56-40ab67 197->199 200 40ab3f-40ab46 197->200 199->162 201 40ab48 200->201 202 40ab4e-40ab51 ExitProcess 200->202 201->202
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 0040A72F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID: `Q@$hQ@
                          • API String ID: 2882836952-890478580
                          • Opcode ID: 8c959c5b40b4c3d506433864207d669b71d149facf18fdd5dbabe781358c8114
                          • Instruction ID: bf389b76696b9d5be0d5ae96c1d7e353f7cf7195faaeb2b6b3d5cb8ade6aa3fb
                          • Opcode Fuzzy Hash: 8c959c5b40b4c3d506433864207d669b71d149facf18fdd5dbabe781358c8114
                          • Instruction Fuzzy Hash: 715168706003059FDB20DF69C88475B7BA1AB48329F14853FE845AB3D2C738D894CF5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 203 5f7990-5f79ab PeekMessageW 204 5f7a99-5f7aa0 203->204 205 5f79b1-5f79b5 203->205 206 5f79b7-5f79bf IsWindowUnicode 205->206 207 5f79c5 205->207 206->207 208 5f79c1-5f79c3 206->208 209 5f79c7-5f79d0 207->209 208->209 210 5f79e8-5f79fb PeekMessageA 209->210 211 5f79d2-5f79e6 PeekMessageW 209->211 212 5f79fc-5f79fe 210->212 211->212 212->204 213 5f7a04-5f7a0a 212->213 214 5f7a92 213->214 215 5f7a10-5f7a1c 213->215 214->204 216 5f7a2e-5f7a39 call 5f982c 215->216 217 5f7a1e-5f7a22 215->217 216->204 220 5f7a3b-5f7a46 call 5f7824 216->220 217->216 220->204 223 5f7a48-5f7a4c 220->223 223->204 224 5f7a4e-5f7a59 call 5f76dc 223->224 224->204 227 5f7a5b-5f7a66 call 5f772c 224->227 227->204 230 5f7a68-5f7a73 call 5f7694 227->230 230->204 233 5f7a75-5f7a80 TranslateMessage 230->233 234 5f7a8a-5f7a90 DispatchMessageA 233->234 235 5f7a82-5f7a88 DispatchMessageW 233->235 234->204 235->204
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005F79A4
                          • IsWindowUnicode.USER32 ref: 005F79B8
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F79DB
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 005F79F1
                          • TranslateMessage.USER32 ref: 005F7A76
                          • DispatchMessageW.USER32 ref: 005F7A83
                          • DispatchMessageA.USER32 ref: 005F7A8B
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                          • String ID:
                          • API String ID: 2190272339-0
                          • Opcode ID: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                          • Instruction ID: 1819d594af2c5eab64940d387a41f49d349f48961b942df89d4b8fbc70f69a18
                          • Opcode Fuzzy Hash: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                          • Instruction Fuzzy Hash: 3C213A3030C30F76EA3176691C02BBF9FA66FDA744F15485EF6C1A7183C69D9D428116
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 236 426358-426378 call 40b8b4 GetFileAttributesW 239 42637e-426384 236->239 240 4263ff-426407 GetLastError 236->240 243 426386-42638f 239->243 244 426394-426398 239->244 241 426429-42642b 240->241 242 426409-42640c 240->242 246 42642f-426436 241->246 242->241 245 42640e-426413 242->245 243->246 247 42639a-4263b5 CreateFileW 244->247 248 4263c8-4263ce 244->248 245->241 251 426415-426418 245->251 247->246 252 4263b7-4263c6 CloseHandle 247->252 249 4263d0-4263d2 248->249 250 4263d4-4263ef CreateFileW 248->250 249->246 253 4263f1-4263f9 CloseHandle 250->253 254 4263fb-4263fd 250->254 251->241 255 42641a-42641d 251->255 252->246 253->246 254->246 255->241 256 42641f-426422 255->256 256->241 257 426424-426427 256->257 257->241 258 42642d 257->258 258->246
                          APIs
                          • GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0063D12F,00000000,0063D1B1), ref: 0042636E
                          • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0063D12F,00000000,0063D1B1), ref: 004263AD
                          • CloseHandle.KERNEL32(00000000,00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0063D12F,00000000), ref: 004263B8
                          • GetLastError.KERNEL32(00000000,?,?,?,?,?,0063D12F,00000000,0063D1B1), ref: 004263FF
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: File$AttributesCloseCreateErrorHandleLast
                          • String ID:
                          • API String ID: 2927643983-0
                          • Opcode ID: b4d460509f70ea0e92052b55ac83f7fa701681a5cde35777b244f35e7de593d1
                          • Instruction ID: f884233c9fbeac1e381cd67e66b09af42d2541b8b2dd501ab063c9e53970deff
                          • Opcode Fuzzy Hash: b4d460509f70ea0e92052b55ac83f7fa701681a5cde35777b244f35e7de593d1
                          • Instruction Fuzzy Hash: 7F11E631B8533424F97471292CA6BBB19484742324FFB1B2FFF94E62D6C99C9881511E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 259 5f7bd4-5f7bec 260 5f7bff-5f7c01 259->260 261 5f7bee-5f7bfd call 4092b4 259->261 262 5f7c05-5f7c79 260->262 261->260 265 5f7c03 261->265 269 5f7cef-5f7d03 262->269 270 5f7c7b-5f7c8b call 409194 262->270 265->262 271 5f7d05-5f7d15 call 409194 269->271 272 5f7d21 269->272 270->269 277 5f7c8d-5f7ca7 call 540ce4 270->277 271->272 278 5f7d17-5f7d1a 271->278 281 5f7ca9-5f7ccc GetWindowLongW SetWindowLongW 277->281 282 5f7cd1-5f7cea call 5ea980 277->282 278->272 281->282 282->269
                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 005F7CB5
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005F7CCC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID: xF^
                          • API String ID: 1378638983-2404611210
                          • Opcode ID: cab198ff6a0ed5326d049e004cf79c4364fe7073f91b75f11c3b292426d39af8
                          • Instruction ID: d21e12046a352beeef49788b7af9e4ed984a83b07167febe3028f0e682133871
                          • Opcode Fuzzy Hash: cab198ff6a0ed5326d049e004cf79c4364fe7073f91b75f11c3b292426d39af8
                          • Instruction Fuzzy Hash: 79413E30A04248EFDB04DF68D885AADBBF5FB4D314F6185A5E910DB3A2C7349E41DB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 301 40e7a8-40e7ea call 40adf8 * 2 call 40ad14 308 40e7f0-40e800 call 40b13c 301->308 309 40e8a4-40e8be call 40ad74 301->309 315 40e802-40e805 308->315 316 40e807-40e80c 308->316 315->316 317 40e833-40e842 call 40e4e4 316->317 318 40e80e-40e817 316->318 325 40e853-40e870 GetUserDefaultUILanguage call 40de94 call 40e610 317->325 326 40e844-40e851 call 40e610 317->326 319 40e819-40e82c call 40bcf0 318->319 320 40e82e-40e831 318->320 319->317 320->317 320->318 333 40e872-40e879 325->333 334 40e895-40e898 325->334 326->309 333->334 335 40e87b-40e890 GetSystemDefaultUILanguage call 40de94 call 40e610 333->335 334->309 336 40e89a-40e89f call 40e6dc 334->336 335->334 336->309
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,0040E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040E946,00000000,?,00000105), ref: 0040E853
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,0040E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040E946,00000000,?,00000105), ref: 0040E87B
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: bfe8366195841122f5b87c890d4a7aeb220990d0aab142a378df80c78a98c1e7
                          • Instruction ID: 72d0a977abe79d3107fad6748333dc0bc4f73ac947b43d7e40db482494eb9d47
                          • Opcode Fuzzy Hash: bfe8366195841122f5b87c890d4a7aeb220990d0aab142a378df80c78a98c1e7
                          • Instruction Fuzzy Hash: C4311E31E002099BDF10EB9AC881A9EB7B5EF44304F50887BE410B72D1D7789D95DB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E908
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E959
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: f6863f4bde23be4286b42fd62f2c53aa68451d5f5e433d15243a5156f691a5bc
                          • Instruction ID: a9e510dddf9aa7672d77988ea03b78d34ec79e9ccb69ebab9c2528ffb051c998
                          • Opcode Fuzzy Hash: f6863f4bde23be4286b42fd62f2c53aa68451d5f5e433d15243a5156f691a5bc
                          • Instruction Fuzzy Hash: 91118270A4061CABDB14EB61C886BDEB3B8DB44704F5144BAA508B72D1DA785F848E99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • CompareStringW.KERNEL32(0000007F,00000001,00000000,00000000,00000000,00000000,00000000,00408CEA,?,?,?,00000000), ref: 00408CC9
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CompareString
                          • String ID:
                          • API String ID: 1825529933-0
                          • Opcode ID: 98e0ee1d1c56dbe6f4717a1317f78c6f6d5ec72e0d6b7f9ed40fa17d5ab99303
                          • Instruction ID: 427018844b36e352fa8e29b42cfd84429ba9d2ca374d5a9d301063d38563c2fb
                          • Opcode Fuzzy Hash: 98e0ee1d1c56dbe6f4717a1317f78c6f6d5ec72e0d6b7f9ed40fa17d5ab99303
                          • Instruction Fuzzy Hash: 66F0AF71204604BEE701F7799D53E5E77ACDB48708B2144BAF800F2692D6785E008A6C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 405 40d658-40d666 406 40d693-40d69e 405->406 407 40d668-40d67f GetModuleFileNameW call 40e8cc 405->407 409 40d684-40d68b 407->409 409->406 410 40d68d-40d690 409->410 410->406
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 0040D676
                            • Part of subcall function 0040E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E908
                            • Part of subcall function 0040E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E959
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction ID: 7a2368e7897d00665728ce74f0a312860674f34f382919375b9f5a120acd9627
                          • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction Fuzzy Hash: EFE0ED71E003109BCB10DE98C8C5A4777D8AB09754F044D76AD18DF38AD375DD2487D5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 411 4102f4-410304 GetSystemInfo
                          APIs
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction ID: 443840a3626eeddebf77da0455205718a42cdeb18484b5aaf4aba9cdddfd1557
                          • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction Fuzzy Hash: A6A012104088004AC804E7194C4380B31805D40214FC40268745CA52D2E61989680EDB
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,00405CAB,?,00406250), ref: 004056AB
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: f0f8622947e25c9ba7e7cc6cb107dc505135641aa540931914f4487e4c9ddb7b
                          • Instruction ID: 7ca22edb1874043d7b54090243566a0edeee2812ca11edc3999e15db113ee496
                          • Opcode Fuzzy Hash: f0f8622947e25c9ba7e7cc6cb107dc505135641aa540931914f4487e4c9ddb7b
                          • Instruction Fuzzy Hash: 59F08CF2B413014BD718CFB89E417027BD6E708356F10423EEA49EB794D7B48800CB84
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 0040DFF5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040E006
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 0040E106
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 0040E118
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 0040E124
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 0040E169
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: 97434a52f30a443f98791299bb16da28b27d0d2f32a3179404d4323a35876b41
                          • Instruction ID: f5ef90f195f92be58e8d8abde117b618d845c4a43648b44f7a45d23ceb6ef030
                          • Opcode Fuzzy Hash: 97434a52f30a443f98791299bb16da28b27d0d2f32a3179404d4323a35876b41
                          • Instruction Fuzzy Hash: 6441C231E006189BCB14DBAACC85ADEB3B5AF44314F1489BAD904F72C1E77C9E558F89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 005EA98E
                          • IsIconic.USER32(?), ref: 005EA9BC
                          • IsWindowVisible.USER32(?), ref: 005EA9CC
                          • ShowWindow.USER32(?,00000000,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EA9E9
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005EA9FC
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005EAA0D
                          • ShowWindow.USER32(?,00000006,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EAA2D
                          • ShowWindow.USER32(?,00000005,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EAA37
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$LongShow$IconicVisible
                          • String ID:
                          • API String ID: 3484284227-0
                          • Opcode ID: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                          • Instruction ID: 967980d16310f0b5b9cbd3626a2fff7d74bce77678304c118b0b10e99edabe9f
                          • Opcode Fuzzy Hash: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                          • Instruction Fuzzy Hash: 7F11B21254E7D038D22A76371C06FEF2EA55F93318F19893AF8D4D2183C22D958AD22B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 0042EDD8: GetEnvironmentVariableW.KERNEL32(00000000,?,00000400,?,?,?,?,00643D71,00643E04,00000000,00643E2C,?,?,00000000,00000000,?), ref: 0042EE01
                          • MoveFileW.KERNEL32(00000000,00000000), ref: 00643DA0
                          • Sleep.KERNEL32(0000001E,00643E04,00000000,00643E2C,?,?,00000000,00000000,?,?,00645E55,0000012C,00000000,00645E82), ref: 00643DA7
                            • Part of subcall function 006421C4: ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0064221C
                            • Part of subcall function 006458E8: Sleep.KERNEL32(00002328,00000000,00645927,?,?,00643DEF,.exe,00645E82,0000012C,0000001E,00643E04,00000000,00643E2C,?,?,00000000), ref: 006458FE
                            • Part of subcall function 006458E8: WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0064590A
                            • Part of subcall function 006458E8: Sleep.KERNEL32(0000012C,00002328,00000000,00645927,?,?,00643DEF,.exe,00645E82,0000012C,0000001E,00643E04,00000000,00643E2C,?,?), ref: 00645914
                          • Sleep.KERNEL32(0000012C,.exe,00645E82,0000012C,0000001E,00643E04,00000000,00643E2C,?,?,00000000,00000000,?,?,00645E55,0000012C), ref: 00643DF4
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$EnvironmentExecExecuteFileMoveShellVariable
                          • String ID: ,>d$.exe$0f$MpCmdRun$Obligation Feeds$\Microsoft\Crypto\Keys\bin01.zip$appdata$bin01.zip$flyer1$flyer2$flyer3$`
                          • API String ID: 4165743239-2673981667
                          • Opcode ID: 0f463440804ee290c8529ede1beae86801afbeee69f1b639338f8d6d83ad2df8
                          • Instruction ID: bf4da9b6238fc0b56ec2f24920d19fa6aaeef78a93ae3693e1dbc0ed640bc1bc
                          • Opcode Fuzzy Hash: 0f463440804ee290c8529ede1beae86801afbeee69f1b639338f8d6d83ad2df8
                          • Instruction Fuzzy Hash: C7512135A00159DFDB00FBA9D88299EB7B6EF49304F608476F500B77A1DB34AE05DB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(FFFFFFF5), ref: 004079F6
                          • GetStdHandle.KERNEL32(000000F6), ref: 00407A01
                          • GetFileType.KERNEL32(00000000), ref: 00407A19
                          • GetConsoleOutputCP.KERNEL32(00000000), ref: 00407A2B
                          • GetConsoleCP.KERNEL32(00000000), ref: 00407A3C
                          • GetFileType.KERNEL32(00000000), ref: 00407B87
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ConsoleFileHandleType$Output
                          • String ID:
                          • API String ID: 393880136-0
                          • Opcode ID: b960acd07b61c48664f6168025843dc1c94e692a252a2ca5f0099b90e8968311
                          • Instruction ID: 8ebf54757fb06b90f849529ed3041580dc919d6577da383de5cfd19486a5a4f1
                          • Opcode Fuzzy Hash: b960acd07b61c48664f6168025843dc1c94e692a252a2ca5f0099b90e8968311
                          • Instruction Fuzzy Hash: 565172B1E0860096EB10AF6488C8B2736A4AF45358F14C57BE805BF2D6D77CF94587AF
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • IsUserAnAdmin.SHELL32 ref: 0063D108
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0063D18A
                            • Part of subcall function 00426358: GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0063D12F,00000000,0063D1B1), ref: 0042636E
                            • Part of subcall function 00426DC8: CreateDirectoryW.KERNEL32(00000000,00000000,?,0063D13D,00000000,0063D1B1), ref: 00426DD5
                            • Part of subcall function 00645DCC: Sleep.KERNEL32(0000012C,00000000,00645E82), ref: 00645E03
                            • Part of subcall function 00645DCC: URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 00645E20
                            • Part of subcall function 00645DCC: Sleep.KERNEL32(0000012C,0000012C,00000000,00645E82), ref: 00645E5A
                          Strings
                          • C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF, xrefs: 0063D14B
                          • C:\Program Files (x86)\Microsoft.NET\base, xrefs: 0063D125, 0063D133
                          • 0f, xrefs: 0063D158
                          • C:\Program Files (x86)\Microsoft.NET\ahs.zip, xrefs: 0063D15F
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileSleep$AdminAttributesCreateDirectoryDownloadMessageUser
                          • String ID: 0f$C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF$C:\Program Files (x86)\Microsoft.NET\ahs.zip$C:\Program Files (x86)\Microsoft.NET\base
                          • API String ID: 3215071381-2558994034
                          • Opcode ID: 555a96963b27dc1b40fd6d8dc41139895a71dd14902fd05f27169e3ae6905b92
                          • Instruction ID: 2d408f61894e5712560a6392dec31c61cb38b33fb157fadb7cc9d89fe1c125d0
                          • Opcode Fuzzy Hash: 555a96963b27dc1b40fd6d8dc41139895a71dd14902fd05f27169e3ae6905b92
                          • Instruction Fuzzy Hash: 2611D370A00704AFD710EF64ED42ADE77ABEF09704F510075F901E7792DB399D008AA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 004096B9
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004096BF
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 004096D2
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 004096DB
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00409752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00409706
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: 4c55b98e3d0d467e5b646acba89185579002ec95ce52656ad4d851ba7cc7ab6f
                          • Instruction ID: b995381765d4b958bbd518a50440c12dc3acf0dc558968af3645ecc573e6b068
                          • Opcode Fuzzy Hash: 4c55b98e3d0d467e5b646acba89185579002ec95ce52656ad4d851ba7cc7ab6f
                          • Instruction Fuzzy Hash: 0E116D76D10208EADB50EFA6D845B9EB7F8EB44304F5480BBE914B72C2D67C9E408B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00436E69
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00436E85
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00436EBE
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00436F3B
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00436F54
                          • VariantCopy.OLEAUT32(?), ref: 00436F89
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-3916222277
                          • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction ID: 6e61a55685988e669f542786f4348fec1cb614f4f2872fc39cf4c2dc29a310ec
                          • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction Fuzzy Hash: 4C51107590161EABCB22DB59DC81BD9B3BCAF4D304F0191EAF508E7211D634AF848F69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0040629A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 004062A0
                          • GetStdHandle.KERNEL32(000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 004062BF
                          • WriteFile.KERNEL32(00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 004062C5
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 004062DC
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 004062E2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: S@
                          • API String ID: 3320372497-58448795
                          • Opcode ID: 9ef58172d352992a22ef0be204057ce800183a04bc078c56848797d64d054d5b
                          • Instruction ID: a044e44056096deb6b34a6e5b11e3c934ae9677e7367ddb42086fa12965f5548
                          • Opcode Fuzzy Hash: 9ef58172d352992a22ef0be204057ce800183a04bc078c56848797d64d054d5b
                          • Instruction Fuzzy Hash: 5A01629129461439D210F3BA9C46F5F1A8CCB55769F10467F7514F61D3C9788C448ABE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,004059A6), ref: 00405DCA
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,004059A6), ref: 00405DE4
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: c5385fe4babf24ed9b869438678f51c544cfe22873789b7c84621fc0f6dc2055
                          • Instruction ID: 6d5b927ee8959eea2492ff581b68670a15e8a422e3416e13a86ce603f5d16fa1
                          • Opcode Fuzzy Hash: c5385fe4babf24ed9b869438678f51c544cfe22873789b7c84621fc0f6dc2055
                          • Instruction Fuzzy Hash: F971B171604B008FE715DB69C98871BBB95EF85314F14C27FE888AB3D2D6788841CF9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetCapture.USER32 ref: 005F7752
                          • IsWindowUnicode.USER32(00000000), ref: 005F7795
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 005F77B0
                          • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 005F77CF
                          • GetWindowThreadProcessId.USER32(00000000), ref: 005F77DE
                          • GetWindowThreadProcessId.USER32(?,?), ref: 005F77EF
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 005F780F
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                          • String ID:
                          • API String ID: 1994056952-0
                          • Opcode ID: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                          • Instruction ID: 1140f500aa7bc5c91f0290db094791f184472ba36d66b0a5b481d4f46a78d9e8
                          • Opcode Fuzzy Hash: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                          • Instruction Fuzzy Hash: 5B21AD7121920CAFD660FA5ACD40FB777DCEF18354F14882AFA99C3242EA58FC408765
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 885eb84e32c63f33276e9590bb5dee011a0a5c2f341cfba876d16c9f00fd8358
                          • Instruction ID: 42a78ca471e248b32bfa053cfdd846e252b294513372de59ff57352f2878a062
                          • Opcode Fuzzy Hash: 885eb84e32c63f33276e9590bb5dee011a0a5c2f341cfba876d16c9f00fd8358
                          • Instruction Fuzzy Hash: C4C11272710A014BEB14EA7D9D8576BB286DBC4325F18823FE605EB3C6DA7CC8018B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409DB8: GetCurrentThreadId.KERNEL32 ref: 00409DBB
                          • GetTickCount.KERNEL32 ref: 00409963
                          • GetTickCount.KERNEL32 ref: 0040997B
                          • GetCurrentThreadId.KERNEL32 ref: 004099AA
                          • GetTickCount.KERNEL32 ref: 004099D5
                          • GetTickCount.KERNEL32 ref: 00409A0C
                          • GetTickCount.KERNEL32 ref: 00409A36
                          • GetCurrentThreadId.KERNEL32 ref: 00409AA6
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: 1c999e2f02313124bca4f28fea24c930a350f81f416e63fe2e0a0fa511df7c3d
                          • Instruction ID: 03bd8582b1eb01f38dc3bc03a00dde36fd162c63f8ac2178b870ebcacfb3a5be
                          • Opcode Fuzzy Hash: 1c999e2f02313124bca4f28fea24c930a350f81f416e63fe2e0a0fa511df7c3d
                          • Instruction Fuzzy Hash: 584160716083819ED721AE7CC48471FBAD1AF91354F158A3EE4D8A73D3E7789C808B46
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ShellExecuteExW.SHELL32(?), ref: 0063CF42
                          • WaitForSingleObject.KERNEL32(?,000000FF,00000000,0063CFB0,?,00000000,0063CFD5,?,?,?,?), ref: 0063CF51
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 0063CF73
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 0063CF85
                          • CloseHandle.KERNEL32(?,00000001,?,00000000,000000FF,000004FF,00000001,?,00000000,000000FF,000004FF,?,000000FF,00000000,0063CFB0), ref: 0063CF95
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Wait$CloseCodeExecuteExitHandleMultipleObjectObjectsProcessShellSingle
                          • String ID: runas
                          • API String ID: 1089270204-4000483414
                          • Opcode ID: b0d14ff01f72e23da7835b9f4b25e20296c4073ea6b9c5da4527cafe289b6ccc
                          • Instruction ID: af8d9016973d803d52dbac5963af21b2f7dbbe7f33d4daff4c2edf7c68e4bd8b
                          • Opcode Fuzzy Hash: b0d14ff01f72e23da7835b9f4b25e20296c4073ea6b9c5da4527cafe289b6ccc
                          • Instruction Fuzzy Hash: 2D31A771604204DFDB00EF69C88199A7BFAEF48314F51857AF804EB395DB34D901CB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C,0065CB9C,?,?,00651C38,00411A03,006508A8), ref: 0040A9E5
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C,0065CB9C,?,?,00651C38,00411A03), ref: 0040A9EB
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,006508A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C), ref: 0040AA06
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,006508A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?), ref: 0040AA0C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: 24eccb18a2650722d7e9c4feb74e667e100e97daa59a13084b08bac2897d350c
                          • Instruction ID: 51659ce6af3bf560b9a44cb2e5d1bfd6ac9861a49438b10b3f69fd65a2529a45
                          • Opcode Fuzzy Hash: 24eccb18a2650722d7e9c4feb74e667e100e97daa59a13084b08bac2897d350c
                          • Instruction Fuzzy Hash: DBF0C2B079034078E710E3945C0BF5A366D9746B2EF50523BB250BD0C1D6BC44C89B2B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,00406250), ref: 00405A67
                          • Sleep.KERNEL32(0000000A,00000000,?,00406250), ref: 00405A7D
                          • Sleep.KERNEL32(00000000,?,?,?,00406250), ref: 00405AAB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,?,00406250), ref: 00405AC1
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 10920623d5bd0f73485c7f625145375b000f501e6bb48b1f84ce46aa406a9279
                          • Instruction ID: e2bb2d7a972bb427660176896104d2a2a9f6eb7761a28719d4f67168c38934f8
                          • Opcode Fuzzy Hash: 10920623d5bd0f73485c7f625145375b000f501e6bb48b1f84ce46aa406a9279
                          • Instruction Fuzzy Hash: 16C12772600B518FDB19CF69E984717BBA2EB85311F18827FD4059B3D5C3B8A881CF96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32(h?L,00000004,004C1F90,00000000,004C3D76,?,?,004C1F90,00000001), ref: 004C3D18
                          • GetCurrentThread.KERNEL32 ref: 004C3D50
                          • GetCurrentThreadId.KERNEL32 ref: 004C3D58
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread$ErrorLast
                          • String ID: 4}I$h?L
                          • API String ID: 4172138867-1832910702
                          • Opcode ID: 384057c9ed27486318e0d1cb79d09538608d2e6e48a037c23f98f6c091e1809f
                          • Instruction ID: cde72534dc1b85ed7777d44f99b3923cfe206a8029fa93250547d3539bdf6d9e
                          • Opcode Fuzzy Hash: 384057c9ed27486318e0d1cb79d09538608d2e6e48a037c23f98f6c091e1809f
                          • Instruction Fuzzy Hash: 12216375904741AEC311DF768C41BAABBA5AF4A304F00C53FE81093682EB3DA914C3AD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0064221C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: " start= auto$/C sc create WdCmdSvc binPath= "$cmd.exe$runas
                          • API String ID: 587946157-3037528773
                          • Opcode ID: 7d1d544df77567f941acdc1226a5342d22884f6eab2101d292892e61383fd4e3
                          • Instruction ID: 30f8f02b7a5a070be177f3fde74a020a6dcd092872bed4146740dca37fb95d6a
                          • Opcode Fuzzy Hash: 7d1d544df77567f941acdc1226a5342d22884f6eab2101d292892e61383fd4e3
                          • Instruction Fuzzy Hash: 8DF0C230644705BFEB01ABA5CC63F5FBBAAEF44B10FF24079B404B2AD1D6B46B109559
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(005F64D4,00000000), ref: 005F661E
                          • ShowWindow.USER32(?,00000000,005F64D4,00000000), ref: 005F6660
                          • ShowOwnedPopups.USER32(00000000,?), ref: 005F668F
                          • ShowWindow.USER32(?,00000005), ref: 005F6704
                          • ShowOwnedPopups.USER32(00000000,?), ref: 005F6733
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Show$OwnedPopupsWindow$EnumWindows
                          • String ID:
                          • API String ID: 315437064-0
                          • Opcode ID: 4d8a3e18794adedaa74e389caa8746cea8cd8ecb6de7cf9aa85c5c2b889b9ec4
                          • Instruction ID: 9d540ff84875134cf94e77d6bc6f24353aedf2b0752c643ac3729871f7954d28
                          • Opcode Fuzzy Hash: 4d8a3e18794adedaa74e389caa8746cea8cd8ecb6de7cf9aa85c5c2b889b9ec4
                          • Instruction Fuzzy Hash: D4415F30601B458FD720EB38C888BBA77E2FB85358F150979E659CB2A1C778EC85DB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32(00000000,004B6D20,?,?,00493834,00000001), ref: 004B6C5E
                            • Part of subcall function 00425EE4: CreateFileW.KERNEL32(00000000,000000F0,000000F0,00000000,00000003,00000080,00000000,00000000,?,00493834,004B6CA0,00000000,004B6D20,?,?,00493834), ref: 00425F33
                            • Part of subcall function 00426CA4: GetFullPathNameW.KERNEL32(00000000,00000104,?,?,?,00000000,?,00493834,004B6CBB,00000000,004B6D20,?,?,00493834,00000001), ref: 00426CC7
                          • GetLastError.KERNEL32(00000000,004B6D20,?,?,00493834,00000001), ref: 004B6CC5
                            • Part of subcall function 0042A7E4: FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,004C398E,?,004C3D27,h?L,00000004,004C1F90,00000000), ref: 0042A808
                            • Part of subcall function 0042A7E4: LocalFree.KERNEL32(00000001,0042A861,00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,004C398E,?,004C3D27,h?L,00000004), ref: 0042A854
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateFileFormatFreeFullLocalMessageNamePath
                          • String ID: YZd$Zd${A
                          • API String ID: 503893064-3041092494
                          • Opcode ID: a310de7e9641b3e0c644ad73fb843374630b933ecaa3ac2bca56d43912b72614
                          • Instruction ID: 7d4060a9b350e455d836b401e26da1b8affe76bd0eb611a8e8974374352e35d3
                          • Opcode Fuzzy Hash: a310de7e9641b3e0c644ad73fb843374630b933ecaa3ac2bca56d43912b72614
                          • Instruction Fuzzy Hash: C2418370E006198FDB00EF7AC8815EEBBB1EF58314F41817EE854A7382DB7D5905CA69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DeleteFileW.KERNEL32(00000000,?,?,?,?,00643D3A,00643E04,00000000,00643E2C,?,?,00000000,00000000,?,?,00645E55), ref: 004268C8
                          • GetLastError.KERNEL32(00000000,?,?,?,?,00643D3A,00643E04,00000000,00643E2C,?,?,00000000,00000000,?,?,00645E55), ref: 004268D7
                          • GetFileAttributesW.KERNEL32(00000000,00000000,?,?,?,?,00643D3A,00643E04,00000000,00643E2C,?,?,00000000,00000000,?), ref: 004268DF
                          • RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,?,?,?,?,00643D3A,00643E04,00000000,00643E2C,?,?,00000000,00000000,?), ref: 004268FA
                          • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,00643D3A,00643E04,00000000,00643E2C,?,?,00000000,00000000,?), ref: 00426908
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorFileLast$AttributesDeleteDirectoryRemove
                          • String ID:
                          • API String ID: 2814369299-0
                          • Opcode ID: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                          • Instruction ID: bdcfeb7743e0d8f348d484b85ba42355febc9b21ae2807b4ebd598fdaca21e89
                          • Opcode Fuzzy Hash: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                          • Instruction Fuzzy Hash: 76F0A7B1341268199D20367E2C85EBE114CCA4276DB56067BFD50D62D3DD2F9C8A815D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhookWindowsHookEx.USER32(00000000), ref: 005F56E6
                          • SetEvent.KERNEL32(00000000), ref: 005F5712
                          • GetCurrentThreadId.KERNEL32 ref: 005F5717
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 005F5740
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 005F574D
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                          • String ID:
                          • API String ID: 2132507429-0
                          • Opcode ID: be6be8d32e9f459414e21e1d34a4732e1830c6d53c973313dd7bf3ca7cb7b1b0
                          • Instruction ID: 8b626208f8899808b6ee2f8f124ee13ad0b37cacd823660b877cb21a46016582
                          • Opcode Fuzzy Hash: be6be8d32e9f459414e21e1d34a4732e1830c6d53c973313dd7bf3ca7cb7b1b0
                          • Instruction Fuzzy Hash: 92018F306456059FE700EBA5DD41B6A77E9AB85314F014939F2A4C61E1EAB89880CB55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(0000012C,00000000,00645E82), ref: 00645E03
                          • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 00645E20
                          • Sleep.KERNEL32(0000012C,0000012C,00000000,00645E82), ref: 00645E5A
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$DownloadFile
                          • String ID: ,f
                          • API String ID: 2087964873-3748256950
                          • Opcode ID: 1cff4639f8e936e10fe75d82fdd5624a15ed54fcf5086ac0c1946ef543442d38
                          • Instruction ID: d48d2178d86babef39e8bbd17a78c548b34d81dc44b6d7c6109f13122099aa3b
                          • Opcode Fuzzy Hash: 1cff4639f8e936e10fe75d82fdd5624a15ed54fcf5086ac0c1946ef543442d38
                          • Instruction Fuzzy Hash: FA113D30600704EFD700EB6AC883E8D77A9EF49744F504076F904A77A2D738AE519A59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00002328,00000000,00645927,?,?,00643DEF,.exe,00645E82,0000012C,0000001E,00643E04,00000000,00643E2C,?,?,00000000), ref: 006458FE
                          • WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0064590A
                          • Sleep.KERNEL32(0000012C,00002328,00000000,00645927,?,?,00643DEF,.exe,00645E82,0000012C,0000001E,00643E04,00000000,00643E2C,?,?), ref: 00645914
                          Strings
                          • C:\WINDOWS\system32\shutdown.exe -r -t 1 -f, xrefs: 00645905
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep$Exec
                          • String ID: C:\WINDOWS\system32\shutdown.exe -r -t 1 -f
                          • API String ID: 1325486322-941748481
                          • Opcode ID: 0ed2c25b13371a61b120711a2966d9d7fce82db211322bfa3b7bad175ee13516
                          • Instruction ID: 74406f25b816e9879b4369fe822fa42436d79d3e863aa6dc7be93af211853af5
                          • Opcode Fuzzy Hash: 0ed2c25b13371a61b120711a2966d9d7fce82db211322bfa3b7bad175ee13516
                          • Instruction Fuzzy Hash: 48D01234384B50FAE2122B676C13BA67A49D349F24FD30865F501659C2D89954108469
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0040DD89
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0040DDE7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0040DE44
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0040DE77
                            • Part of subcall function 0040DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0040DDF5), ref: 0040DD4B
                            • Part of subcall function 0040DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0040DDF5), ref: 0040DD68
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: a26d3ba3cebedfc12237a51de21440b4cf2ba9c2b8b936941c76abe64d2c2e17
                          • Instruction ID: aba8d60d3f90c2c419027a019534d1487b5d55c7c4fc269c7a15dd30b25f1070
                          • Opcode Fuzzy Hash: a26d3ba3cebedfc12237a51de21440b4cf2ba9c2b8b936941c76abe64d2c2e17
                          • Instruction Fuzzy Hash: 87317C70E0021A9BDB10EFE9C884AAEB3B5FF14314F40457AE515FB2D1DB789A09CB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetActiveWindow.USER32(?,?,006601D8,005F7DC8), ref: 005F714E
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction ID: 55d906015107a1f6f88df5c28493e177dacb6cd1a3f14b4bdcd2407b3661111c
                          • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction Fuzzy Hash: 55312B706042899BDB54EE6DC8C9BAA3BA67F48304F0454B5BE05DF28BCB78DC85C761
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindow.USER32(?,00000004), ref: 005F64E6
                          • GetWindowThreadProcessId.USER32(?,?), ref: 005F6503
                          • GetCurrentProcessId.KERNEL32(?,00000004), ref: 005F650F
                          • IsWindowVisible.USER32(?), ref: 005F6569
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$Process$CurrentThreadVisible
                          • String ID:
                          • API String ID: 3926708836-0
                          • Opcode ID: 0b87af43373d3896225330ed2514b771849e1e69a9375bd40ce0463a4e2e0ecf
                          • Instruction ID: 92dcea2b484ec88a49d61880b7cc9426234b807fb166ddd0fe1e6ecaa1d3b934
                          • Opcode Fuzzy Hash: 0b87af43373d3896225330ed2514b771849e1e69a9375bd40ce0463a4e2e0ecf
                          • Instruction Fuzzy Hash: B9318E31600209AFDB50DFA9D8C4BBAB7A5FB05314F4451B5EE04E739ADB78ED408B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(005F61C0), ref: 005F62B1
                          • GetWindow.USER32(00000003,00000003), ref: 005F62C9
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 005F62D6
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 005F6315
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$EnumLongWindows
                          • String ID:
                          • API String ID: 4191631535-0
                          • Opcode ID: 81c53c4ca72d230e9ee7fc13719ebccf6833b32577f15cbdc244313b5dd28d99
                          • Instruction ID: 936fbc83c088ac0e8c568c7521c8ea6764f212cdcc539b7f305c1260ebffb7df
                          • Opcode Fuzzy Hash: 81c53c4ca72d230e9ee7fc13719ebccf6833b32577f15cbdc244313b5dd28d99
                          • Instruction Fuzzy Hash: 0B117030704710AFDB10AA18C885FA97B94EF05724F154578FE98AF2D2C7689C84C766
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00533E7D
                          • GetCurrentProcessId.KERNEL32(?,?,00000000,005F985D,?,?,?,00000001,005F7A37), ref: 00533E86
                          • GlobalFindAtomW.KERNEL32(00000000), ref: 00533E9B
                          • GetPropW.USER32(00000000,00000000), ref: 00533EB2
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                          • String ID:
                          • API String ID: 2582817389-0
                          • Opcode ID: f0b9609c593ae1636e81c12c14f89623cad3ab3d3cde2d526b4a0c778bc85e74
                          • Instruction ID: e2a19f9d47b020a096afd139e7a4d43b95e7eea5e09616d6f2802ba2eba2c3b7
                          • Opcode Fuzzy Hash: f0b9609c593ae1636e81c12c14f89623cad3ab3d3cde2d526b4a0c778bc85e74
                          • Instruction Fuzzy Hash: 7DF06573300121B69B21B7B65C8196F6B8CEA143A4701183AFC46D7263D669CDC5A7FC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhandledExceptionFilter.KERNEL32(?,00000000), ref: 0040A1FA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID: hQ@
                          • API String ID: 3192549508-1828285967
                          • Opcode ID: f924984a27f5d0edae11f4708e56f4b05f68107dbb81dc992a22bc56b459c0a2
                          • Instruction ID: aa6cc93045310d53fd7c389dc58617b6b8ea3fe865c8b509ee33e7bb599d98d7
                          • Opcode Fuzzy Hash: f924984a27f5d0edae11f4708e56f4b05f68107dbb81dc992a22bc56b459c0a2
                          • Instruction Fuzzy Hash: 5E4150716043019FD710DB14C884F67B7A5EB85354F1486BEE844AB3A1C739EC91CB6B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 0040A066
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,Function_00009FFC), ref: 0040A0A3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID: hQ@
                          • API String ID: 3192549508-1828285967
                          • Opcode ID: a25b8c03576c17391c850c5f64513a22ec4468a6f63667f0fb9026cb1f0c0a0c
                          • Instruction ID: 8c2c3fa0e60ec44e0d59dfacab71d8ccaf55b5c85c84586d68bf492c0d4e74bc
                          • Opcode Fuzzy Hash: a25b8c03576c17391c850c5f64513a22ec4468a6f63667f0fb9026cb1f0c0a0c
                          • Instruction Fuzzy Hash: B6315070604304AFD720DF14C884F2777E9EB88754F15856AE4449B391C738EC95CB6B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetACP.KERNEL32(004235A0,00000001), ref: 004330F4
                          • GetCPInfo.KERNEL32(004331D8,?,004235A0,00000001), ref: 00433115
                          Strings
                          Memory Dump Source
                          • Source File: 0000000C.00000002.3365361806.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000C.00000002.3365343625.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365361806.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365681647.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365715493.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365734523.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365813044.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365839899.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365863541.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000C.00000002.3365885021.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_12_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Info
                          • String ID: HvA
                          • API String ID: 1807457897-4185303580
                          • Opcode ID: 8e10341278291a90ae1855a8f9a2b29a2afdebd88929d22708958f3f80633dc7
                          • Instruction ID: 125b28fc4cd9637035aee003df9fc371a328bc9b7eaa3d62100f0b49eada27de
                          • Opcode Fuzzy Hash: 8e10341278291a90ae1855a8f9a2b29a2afdebd88929d22708958f3f80633dc7
                          • Instruction Fuzzy Hash: 0801D2326017059FC720EF6A9841997B7E4AF08765F00853BFC55C7742E739EE008BA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:2.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:175
                          Total number of Limit Nodes:10
                          execution_graph 9176 4059b0 9177 405c10 9176->9177 9178 4059c8 9176->9178 9179 405d28 9177->9179 9180 405bd4 9177->9180 9189 4059da 9178->9189 9191 405a65 Sleep 9178->9191 9182 405d31 9179->9182 9183 40575c VirtualAlloc 9179->9183 9186 405bee Sleep 9180->9186 9192 405c2e 9180->9192 9181 4059e9 9184 405797 9183->9184 9185 405787 9183->9185 9200 405710 9185->9200 9190 405c04 Sleep 9186->9190 9186->9192 9188 405ac8 9198 405ad4 9188->9198 9205 405694 9188->9205 9189->9181 9189->9188 9196 405aa9 Sleep 9189->9196 9190->9180 9191->9189 9195 405a7b Sleep 9191->9195 9193 405694 VirtualAlloc 9192->9193 9194 405c4c 9192->9194 9193->9194 9195->9178 9196->9188 9197 405abf Sleep 9196->9197 9197->9189 9201 405758 9200->9201 9202 405719 9200->9202 9201->9184 9202->9201 9203 405724 Sleep 9202->9203 9203->9201 9204 40573e Sleep 9203->9204 9204->9202 9209 405628 9205->9209 9207 40569d VirtualAlloc 9208 4056b4 9207->9208 9208->9198 9210 4055c8 9209->9210 9210->9207 9211 40d658 9212 40d684 9211->9212 9213 40d668 GetModuleFileNameW 9211->9213 9215 40e8cc GetModuleFileNameW 9213->9215 9216 40e91a 9215->9216 9221 40e7a8 9216->9221 9218 40e946 9219 40e958 LoadLibraryExW 9218->9219 9220 40e960 9218->9220 9219->9220 9220->9212 9222 40e7c9 9221->9222 9223 40e851 9222->9223 9239 40e4e4 9222->9239 9223->9218 9225 40e83e 9226 40e853 GetUserDefaultUILanguage 9225->9226 9227 40e844 9225->9227 9243 40de94 EnterCriticalSection 9226->9243 9228 40e610 2 API calls 9227->9228 9228->9223 9230 40e860 9263 40e610 9230->9263 9232 40e86d 9233 40e895 9232->9233 9234 40e87b GetSystemDefaultUILanguage 9232->9234 9233->9223 9267 40e6dc 9233->9267 9235 40de94 17 API calls 9234->9235 9237 40e888 9235->9237 9238 40e610 2 API calls 9237->9238 9238->9233 9240 40e506 9239->9240 9241 40e510 9239->9241 9275 40e1c8 9240->9275 9241->9225 9244 40dee0 LeaveCriticalSection 9243->9244 9245 40dec0 9243->9245 9312 40ad14 9244->9312 9247 40ded1 LeaveCriticalSection 9245->9247 9251 40df82 9247->9251 9248 40def1 IsValidLocale 9249 40df00 9248->9249 9250 40df4f EnterCriticalSection 9248->9250 9252 40df14 9249->9252 9253 40df09 9249->9253 9254 40df67 9250->9254 9251->9230 9327 40db7c 9252->9327 9314 40dd78 GetThreadUILanguage 9253->9314 9259 40df78 LeaveCriticalSection 9254->9259 9257 40df12 9257->9250 9258 40df1d GetSystemDefaultUILanguage 9258->9250 9260 40df27 9258->9260 9259->9251 9261 40df38 GetSystemDefaultUILanguage 9260->9261 9262 40db7c 3 API calls 9261->9262 9262->9257 9265 40e62e 9263->9265 9264 40e6a9 9264->9232 9265->9264 9336 40e5a4 9265->9336 9341 40adf8 9267->9341 9270 40e72c 9271 40e5a4 2 API calls 9270->9271 9272 40e740 9271->9272 9273 40e76e 9272->9273 9274 40e5a4 2 API calls 9272->9274 9273->9223 9274->9273 9276 40e1df 9275->9276 9277 40e1f3 GetModuleFileNameW 9276->9277 9278 40e208 9276->9278 9277->9278 9279 40e230 RegOpenKeyExW 9278->9279 9282 40e3d7 9278->9282 9280 40e2f1 9279->9280 9281 40e257 RegOpenKeyExW 9279->9281 9296 40dfd8 GetModuleHandleW 9280->9296 9281->9280 9283 40e275 RegOpenKeyExW 9281->9283 9282->9241 9283->9280 9285 40e293 RegOpenKeyExW 9283->9285 9285->9280 9287 40e2b1 RegOpenKeyExW 9285->9287 9286 40e30f RegQueryValueExW 9288 40e360 RegQueryValueExW 9286->9288 9289 40e32d 9286->9289 9287->9280 9291 40e2cf RegOpenKeyExW 9287->9291 9290 40e37c 9288->9290 9295 40e35e 9288->9295 9292 40e335 RegQueryValueExW 9289->9292 9293 40e384 RegQueryValueExW 9290->9293 9291->9280 9291->9282 9292->9295 9293->9295 9294 40e3c6 RegCloseKey 9294->9241 9295->9294 9297 40e000 GetProcAddress 9296->9297 9298 40e011 9296->9298 9297->9298 9299 40e027 9298->9299 9304 40e073 9298->9304 9308 40dfb4 9298->9308 9299->9286 9302 40dfb4 CharNextW 9302->9304 9303 40dfb4 CharNextW 9303->9304 9304->9299 9304->9303 9305 40e0f8 FindFirstFileW 9304->9305 9307 40e162 lstrlenW 9304->9307 9305->9299 9306 40e114 FindClose lstrlenW 9305->9306 9306->9299 9306->9304 9307->9304 9309 40dfc2 9308->9309 9310 40dfd0 9309->9310 9311 40dfba CharNextW 9309->9311 9310->9299 9310->9302 9311->9309 9313 40ad1a 9312->9313 9313->9248 9315 40dd94 9314->9315 9316 40dded 9314->9316 9332 40dd34 GetThreadPreferredUILanguages 9315->9332 9317 40dd34 2 API calls 9316->9317 9323 40ddf5 9317->9323 9320 40de3c SetThreadPreferredUILanguages 9322 40dd34 2 API calls 9320->9322 9324 40de52 9322->9324 9323->9320 9326 40de7d 9323->9326 9325 40de6d SetThreadPreferredUILanguages 9324->9325 9324->9326 9325->9326 9326->9257 9328 40dbb7 9327->9328 9329 40dc20 IsValidLocale 9328->9329 9331 40dc6e 9328->9331 9330 40dc33 GetLocaleInfoW GetLocaleInfoW 9329->9330 9329->9331 9330->9331 9331->9258 9333 40dd6e SetThreadPreferredUILanguages 9332->9333 9334 40dd55 9332->9334 9333->9316 9335 40dd5e GetThreadPreferredUILanguages 9334->9335 9335->9333 9337 40e5b9 9336->9337 9338 40e5d6 FindFirstFileW 9337->9338 9339 40e5e6 FindClose 9338->9339 9340 40e5ec 9338->9340 9339->9340 9340->9265 9342 40adfc GetUserDefaultUILanguage GetLocaleInfoW 9341->9342 9342->9270 9343 650898 9346 4119b8 9343->9346 9345 6508a8 9347 4119c3 9346->9347 9350 40a6f8 9347->9350 9351 40a707 9350->9351 9352 40a70c GetCurrentThreadId 9350->9352 9351->9352 9353 40a742 9352->9353 9354 40aa44 9353->9354 9355 40a7b5 9353->9355 9357 40aa71 9354->9357 9360 40aa60 9354->9360 9369 40a68c 9355->9369 9359 40aa7a GetCurrentThreadId 9357->9359 9363 40aa87 9357->9363 9359->9363 9373 40a9ac 9360->9373 9362 40aa6a 9362->9357 9364 406f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9363->9364 9365 40ab17 FreeLibrary 9363->9365 9366 40ab3f 9363->9366 9364->9363 9365->9363 9367 40ab48 9366->9367 9368 40ab4e ExitProcess 9366->9368 9367->9368 9370 40a6d4 9369->9370 9371 40a69c 9369->9371 9370->9345 9371->9370 9379 4102f4 GetSystemInfo 9371->9379 9374 40a9b6 GetStdHandle WriteFile 9373->9374 9376 40aa13 9373->9376 9380 40b5b8 9374->9380 9376->9362 9378 40aa03 GetStdHandle WriteFile 9378->9362 9379->9371 9381 40b5be 9380->9381 9381->9378

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040E79C,?,?), ref: 0040E70E
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040E79C,?,?), ref: 0040E717
                            • Part of subcall function 0040E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,0040E602,?,00000001), ref: 0040E5D7
                            • Part of subcall function 0040E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,0040E602,?,00000001), ref: 0040E5E7
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 1f6e36aa185c652523092eb0941dc0441a37e40d5a79af7b109eeb79e7c539c8
                          • Instruction ID: 1521c12d98e88c02ce4e97b7da46f2c4cf5f53fde21cfe8a738bb2b61bc2f0a8
                          • Opcode Fuzzy Hash: 1f6e36aa185c652523092eb0941dc0441a37e40d5a79af7b109eeb79e7c539c8
                          • Instruction Fuzzy Hash: 63118770A00209ABDB04EFA6D892AAEB3B5EF44304F50447BB504B76D2D77C6E14DB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 216 40e5a4-40e5e4 call 40adf8 call 40b8b4 FindFirstFileW 221 40e5e6-40e5e7 FindClose 216->221 222 40e5ec-40e601 call 40ad14 216->222 221->222
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,0040E602,?,00000001), ref: 0040E5D7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,0040E602,?,00000001), ref: 0040E5E7
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 72a1b8aea15378f9202b4fdcc74362d1051dfbfa213856e7d2720065714b70c4
                          • Instruction ID: 236e10ae356d36c5b77179bf1b4238c471c7490630b31aaa227146d080fcd7f5
                          • Opcode Fuzzy Hash: 72a1b8aea15378f9202b4fdcc74362d1051dfbfa213856e7d2720065714b70c4
                          • Instruction Fuzzy Hash: E2F0BE71914614AFC710FBB6DC1794FB7ACEB883147A008B6F800F26D2E6389F20992C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E3ED,?,?), ref: 0040E201
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED,?,?), ref: 0040E24A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED,?,?), ref: 0040E26C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040E28A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0040E2A8
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0040E2C6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0040E2E4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E3ED), ref: 0040E324
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001), ref: 0040E34F
                          • RegCloseKey.ADVAPI32(?,0040E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0040E3D0,?,80000001,Software\Embarcadero\Locales), ref: 0040E3CA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 6807586714eca489b6cce4ab7645e82e550bde6d8832df02d91cd193fb517829
                          • Instruction ID: 822bb4a971e66321cac87dbfacc20862d65e6e97d637e961b1a4cba8b43c2446
                          • Opcode Fuzzy Hash: 6807586714eca489b6cce4ab7645e82e550bde6d8832df02d91cd193fb517829
                          • Instruction Fuzzy Hash: F1510975A4060CBEE710E6A6CC42FAF77BCDB48704F6044BBBA04F71C1D6B899509B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000,00000000), ref: 0040DEB2
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000), ref: 0040DED6
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF,?,?,00000000,00000000), ref: 0040DEE5
                          • IsValidLocale.KERNEL32(00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DEF7
                          • EnterCriticalSection.KERNEL32(0065CC14,00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DF54
                          • LeaveCriticalSection.KERNEL32(0065CC14,0065CC14,00000000,00000002,0065CC14,0065CC14,00000000,0040DF98,?,?,?,00000000,?,0040E860,00000000,0040E8BF), ref: 0040DF7D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: f60b0f688af226c40a850fec6f59b7a5055c9c4a2b2d91d70c7d579d7fba16ac
                          • Instruction ID: 9dc58e0cee5aed313cf8ac6d093b04234b82adfd59d892b314dab79c5b81b1ae
                          • Opcode Fuzzy Hash: f60b0f688af226c40a850fec6f59b7a5055c9c4a2b2d91d70c7d579d7fba16ac
                          • Instruction Fuzzy Hash: 4621C370F007016EDB10F7BA9C02B1A2196DF85759FA1947FB405BA2C2CA7C8C4887AE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 40a6f8-40a705 68 40a707 67->68 69 40a70c-40a740 GetCurrentThreadId 67->69 68->69 70 40a742 69->70 71 40a744-40a770 call 40a5dc 69->71 70->71 74 40a772-40a774 71->74 75 40a779-40a780 71->75 74->75 76 40a776 74->76 77 40a782-40a785 75->77 78 40a78a-40a790 75->78 76->75 77->78 79 40a792 78->79 80 40a795-40a79c 78->80 79->80 81 40a7ab-40a7af 80->81 82 40a79e-40a7a5 80->82 83 40aa44-40aa5e 81->83 84 40a7b5 call 40a68c 81->84 82->81 86 40aa60-40aa6c call 40a924 call 40a9ac 83->86 87 40aa71-40aa78 83->87 89 40a7ba 84->89 86->87 90 40aa7a-40aa85 GetCurrentThreadId 87->90 91 40aa9b-40aa9f 87->91 90->91 93 40aa87-40aa96 call 40a5fc call 40a980 90->93 94 40aaa1-40aaa5 91->94 95 40aab9-40aabd 91->95 93->91 94->95 100 40aaa7-40aab7 94->100 96 40aac9-40aacd 95->96 97 40aabf-40aac2 95->97 102 40aaec-40aaf5 call 40a624 96->102 103 40aacf-40aad8 call 406f7c 96->103 97->96 101 40aac4-40aac6 97->101 100->95 101->96 112 40aaf7-40aafa 102->112 113 40aafc-40ab01 102->113 103->102 114 40aada-40aaea call 408ea8 call 406f7c 103->114 112->113 115 40ab1d-40ab28 call 40a5fc 112->115 113->115 116 40ab03-40ab11 call 40eaec 113->116 114->102 125 40ab2a 115->125 126 40ab2d-40ab31 115->126 116->115 124 40ab13-40ab15 116->124 124->115 128 40ab17-40ab18 FreeLibrary 124->128 125->126 129 40ab33-40ab35 call 40a980 126->129 130 40ab3a-40ab3d 126->130 128->115 129->130 131 40ab56-40ab67 130->131 132 40ab3f-40ab46 130->132 131->95 134 40ab48 132->134 135 40ab4e-40ab51 ExitProcess 132->135 134->135
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 0040A72F
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID: `Q@$hQ@
                          • API String ID: 2882836952-890478580
                          • Opcode ID: 8c959c5b40b4c3d506433864207d669b71d149facf18fdd5dbabe781358c8114
                          • Instruction ID: bf389b76696b9d5be0d5ae96c1d7e353f7cf7195faaeb2b6b3d5cb8ade6aa3fb
                          • Opcode Fuzzy Hash: 8c959c5b40b4c3d506433864207d669b71d149facf18fdd5dbabe781358c8114
                          • Instruction Fuzzy Hash: 715168706003059FDB20DF69C88475B7BA1AB48329F14853FE845AB3D2C738D894CF5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 136 40e7a8-40e7ea call 40adf8 * 2 call 40ad14 143 40e7f0-40e800 call 40b13c 136->143 144 40e8a4-40e8be call 40ad74 136->144 150 40e802-40e805 143->150 151 40e807-40e80c 143->151 150->151 152 40e833-40e842 call 40e4e4 151->152 153 40e80e-40e817 151->153 160 40e853-40e870 GetUserDefaultUILanguage call 40de94 call 40e610 152->160 161 40e844-40e851 call 40e610 152->161 154 40e819-40e82c call 40bcf0 153->154 155 40e82e-40e831 153->155 154->152 155->152 155->153 168 40e872-40e879 160->168 169 40e895-40e898 160->169 161->144 168->169 170 40e87b-40e890 GetSystemDefaultUILanguage call 40de94 call 40e610 168->170 169->144 171 40e89a-40e89f call 40e6dc 169->171 170->169 171->144
                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,0040E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040E946,00000000,?,00000105), ref: 0040E853
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,0040E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040E946,00000000,?,00000105), ref: 0040E87B
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 0bd8beee84a8ff7d3371a70293626c49bc08c7d605e67fc63ac8bf19e4022f5e
                          • Instruction ID: 72d0a977abe79d3107fad6748333dc0bc4f73ac947b43d7e40db482494eb9d47
                          • Opcode Fuzzy Hash: 0bd8beee84a8ff7d3371a70293626c49bc08c7d605e67fc63ac8bf19e4022f5e
                          • Instruction Fuzzy Hash: C4311E31E002099BDF10EB9AC881A9EB7B5EF44304F50887BE410B72D1D7789D95DB99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E908
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E959
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: f6863f4bde23be4286b42fd62f2c53aa68451d5f5e433d15243a5156f691a5bc
                          • Instruction ID: a9e510dddf9aa7672d77988ea03b78d34ec79e9ccb69ebab9c2528ffb051c998
                          • Opcode Fuzzy Hash: f6863f4bde23be4286b42fd62f2c53aa68451d5f5e433d15243a5156f691a5bc
                          • Instruction Fuzzy Hash: 91118270A4061CABDB14EB61C886BDEB3B8DB44704F5144BAA508B72D1DA785F848E99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 226 40d658-40d666 227 40d693-40d69e 226->227 228 40d668-40d67f GetModuleFileNameW call 40e8cc 226->228 230 40d684-40d68b 228->230 230->227 231 40d68d-40d690 230->231 231->227
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 0040D676
                            • Part of subcall function 0040E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E908
                            • Part of subcall function 0040E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040E986,?,00400000,00651C1C), ref: 0040E959
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction ID: 7a2368e7897d00665728ce74f0a312860674f34f382919375b9f5a120acd9627
                          • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction Fuzzy Hash: EFE0ED71E003109BCB10DE98C8C5A4777D8AB09754F044D76AD18DF38AD375DD2487D5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 232 4102f4-410304 GetSystemInfo
                          APIs
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction ID: 443840a3626eeddebf77da0455205718a42cdeb18484b5aaf4aba9cdddfd1557
                          • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction Fuzzy Hash: A6A012104088004AC804E7194C4380B31805D40214FC40268745CA52D2E61989680EDB
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 233 405694-4056b2 call 405628 VirtualAlloc 236 405702-40570d 233->236 237 4056b4-405701 233->237
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,00405CAB,?,00406250), ref: 004056AB
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: f0f8622947e25c9ba7e7cc6cb107dc505135641aa540931914f4487e4c9ddb7b
                          • Instruction ID: 7ca22edb1874043d7b54090243566a0edeee2812ca11edc3999e15db113ee496
                          • Opcode Fuzzy Hash: f0f8622947e25c9ba7e7cc6cb107dc505135641aa540931914f4487e4c9ddb7b
                          • Instruction Fuzzy Hash: 59F08CF2B413014BD718CFB89E417027BD6E708356F10423EEA49EB794D7B48800CB84
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 0040DFF5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040E006
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 0040E106
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 0040E118
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 0040E124
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 0040E169
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: 97434a52f30a443f98791299bb16da28b27d0d2f32a3179404d4323a35876b41
                          • Instruction ID: f5ef90f195f92be58e8d8abde117b618d845c4a43648b44f7a45d23ceb6ef030
                          • Opcode Fuzzy Hash: 97434a52f30a443f98791299bb16da28b27d0d2f32a3179404d4323a35876b41
                          • Instruction Fuzzy Hash: 6441C231E006189BCB14DBAACC85ADEB3B5AF44314F1489BAD904F72C1E77C9E558F89
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 005EA98E
                          • IsIconic.USER32(?), ref: 005EA9BC
                          • IsWindowVisible.USER32(?), ref: 005EA9CC
                          • ShowWindow.USER32(?,00000000,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EA9E9
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005EA9FC
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005EAA0D
                          • ShowWindow.USER32(?,00000006,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EAA2D
                          • ShowWindow.USER32(?,00000005,00000000,?,?,?,005F7CEF,?,006601D8), ref: 005EAA37
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$LongShow$IconicVisible
                          • String ID:
                          • API String ID: 3484284227-0
                          • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction ID: 967980d16310f0b5b9cbd3626a2fff7d74bce77678304c118b0b10e99edabe9f
                          • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction Fuzzy Hash: 7F11B21254E7D038D22A76371C06FEF2EA55F93318F19893AF8D4D2183C22D958AD22B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 291 407948-407962 292 407973-407984 291->292 293 407964-407967 291->293 296 4079aa-4079b6 292->296 294 407986-407997 293->294 295 407969-40796c 293->295 294->296 297 407999-4079a3 295->297 298 40796e 295->298 299 407a60-407a80 CreateFileW 296->299 300 4079bc-4079c0 296->300 297->296 301 407bab-407bb1 298->301 302 407a82-407a8f GetLastError 299->302 303 407a94-407a9c 299->303 304 4079d2-4079df 300->304 305 4079c2-4079cb 300->305 302->301 306 407aa2-407ab7 GetFileSize 303->306 307 407b64-407b6c 303->307 308 4079e1-4079e7 304->308 309 4079ff-407a06 GetStdHandle 304->309 305->304 313 407ac7-407acf 306->313 314 407ab9-407ac2 call 407930 306->314 310 407b7c-407b82 307->310 311 407b6e-407b75 307->311 315 4079f0 308->315 316 4079e9-4079ee 308->316 312 407a08-407a10 309->312 310->301 318 407b84-407b8f GetFileType 310->318 311->310 312->310 317 407a16-407a21 GetFileType 312->317 321 407ad1 313->321 322 407ad3-407ae1 SetFilePointer 313->322 314->301 320 4079f5-4079fd GetStdHandle 315->320 316->320 325 407a23-407a29 317->325 326 407a4d-407a5b 317->326 327 407b91-407b92 318->327 328 407b96-407ba2 call 407930 318->328 320->312 321->322 323 407b02-407b0b call 407930 322->323 324 407ae3-407b00 ReadFile 322->324 323->301 324->323 330 407b10-407b14 324->330 332 407a2b-407a37 GetConsoleOutputCP 325->332 333 407a3c-407a48 GetConsoleCP 325->333 326->310 334 407ba4 327->334 335 407b94 327->335 328->301 330->307 338 407b16-407b1a 330->338 332->310 333->310 334->301 335->301 338->307 340 407b1c-407b22 338->340 340->307 341 407b24-407b27 340->341 342 407b2d-407b30 341->342 343 407b32-407b46 SetFilePointer 342->343 344 407b5f-407b62 342->344 345 407b54-407b5d call 407930 343->345 346 407b48-407b52 SetEndOfFile 343->346 344->307 344->342 345->301 346->307 346->345
                          APIs
                          • GetStdHandle.KERNEL32(FFFFFFF5), ref: 004079F6
                          • GetStdHandle.KERNEL32(000000F6), ref: 00407A01
                          • GetFileType.KERNEL32(00000000), ref: 00407A19
                          • GetConsoleOutputCP.KERNEL32(00000000), ref: 00407A2B
                          • GetConsoleCP.KERNEL32(00000000), ref: 00407A3C
                          • GetFileType.KERNEL32(00000000), ref: 00407B87
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ConsoleFileHandleType$Output
                          • String ID:
                          • API String ID: 393880136-0
                          • Opcode ID: b960acd07b61c48664f6168025843dc1c94e692a252a2ca5f0099b90e8968311
                          • Instruction ID: 8ebf54757fb06b90f849529ed3041580dc919d6577da383de5cfd19486a5a4f1
                          • Opcode Fuzzy Hash: b960acd07b61c48664f6168025843dc1c94e692a252a2ca5f0099b90e8968311
                          • Instruction Fuzzy Hash: 565172B1E0860096EB10AF6488C8B2736A4AF45358F14C57BE805BF2D6D77CF94587AF
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 004096B9
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004096BF
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 004096D2
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 004096DB
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,00409752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 00409706
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: 4c55b98e3d0d467e5b646acba89185579002ec95ce52656ad4d851ba7cc7ab6f
                          • Instruction ID: b995381765d4b958bbd518a50440c12dc3acf0dc558968af3645ecc573e6b068
                          • Opcode Fuzzy Hash: 4c55b98e3d0d467e5b646acba89185579002ec95ce52656ad4d851ba7cc7ab6f
                          • Instruction Fuzzy Hash: 0E116D76D10208EADB50EFA6D845B9EB7F8EB44304F5480BBE914B72C2D67C9E408B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00411ABC
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: d252f07f15a84d542ecdd5532b81461482ebaf0dc132f7805e42222139815d2c
                          • Instruction ID: a5eef740b33532c345308cc3144c95156f97c5d58eee02d19cda8f37d6941e0e
                          • Opcode Fuzzy Hash: d252f07f15a84d542ecdd5532b81461482ebaf0dc132f7805e42222139815d2c
                          • Instruction Fuzzy Hash: 2AA17475A003099FDB14CFE9D880BEEB7B5FF48311F14411AEA15A73A0E778A985CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00436E69
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00436E85
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00436EBE
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00436F3B
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00436F54
                          • VariantCopy.OLEAUT32(?), ref: 00436F89
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-3916222277
                          • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction ID: 6e61a55685988e669f542786f4348fec1cb614f4f2872fc39cf4c2dc29a310ec
                          • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction Fuzzy Hash: 4C51107590161EABCB22DB59DC81BD9B3BCAF4D304F0191EAF508E7211D634AF848F69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0040629A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 004062A0
                          • GetStdHandle.KERNEL32(000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 004062BF
                          • WriteFile.KERNEL32(00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 004062C5
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 004062DC
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,004053E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 004062E2
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: S@
                          • API String ID: 3320372497-58448795
                          • Opcode ID: 9ef58172d352992a22ef0be204057ce800183a04bc078c56848797d64d054d5b
                          • Instruction ID: a044e44056096deb6b34a6e5b11e3c934ae9677e7367ddb42086fa12965f5548
                          • Opcode Fuzzy Hash: 9ef58172d352992a22ef0be204057ce800183a04bc078c56848797d64d054d5b
                          • Instruction Fuzzy Hash: 5A01629129461439D210F3BA9C46F5F1A8CCB55769F10467F7514F61D3C9788C448ABE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,004059A6), ref: 00405DCA
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,004059A6), ref: 00405DE4
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: c5385fe4babf24ed9b869438678f51c544cfe22873789b7c84621fc0f6dc2055
                          • Instruction ID: 6d5b927ee8959eea2492ff581b68670a15e8a422e3416e13a86ce603f5d16fa1
                          • Opcode Fuzzy Hash: c5385fe4babf24ed9b869438678f51c544cfe22873789b7c84621fc0f6dc2055
                          • Instruction Fuzzy Hash: F971B171604B008FE715DB69C98871BBB95EF85314F14C27FE888AB3D2D6788841CF9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetCapture.USER32 ref: 005F7752
                          • IsWindowUnicode.USER32(00000000), ref: 005F7795
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 005F77B0
                          • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 005F77CF
                          • GetWindowThreadProcessId.USER32(00000000), ref: 005F77DE
                          • GetWindowThreadProcessId.USER32(?,?), ref: 005F77EF
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 005F780F
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                          • String ID:
                          • API String ID: 1994056952-0
                          • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction ID: 1140f500aa7bc5c91f0290db094791f184472ba36d66b0a5b481d4f46a78d9e8
                          • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction Fuzzy Hash: 5B21AD7121920CAFD660FA5ACD40FB777DCEF18354F14882AFA99C3242EA58FC408765
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 885eb84e32c63f33276e9590bb5dee011a0a5c2f341cfba876d16c9f00fd8358
                          • Instruction ID: 42a78ca471e248b32bfa053cfdd846e252b294513372de59ff57352f2878a062
                          • Opcode Fuzzy Hash: 885eb84e32c63f33276e9590bb5dee011a0a5c2f341cfba876d16c9f00fd8358
                          • Instruction Fuzzy Hash: C4C11272710A014BEB14EA7D9D8576BB286DBC4325F18823FE605EB3C6DA7CC8018B59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00409DB8: GetCurrentThreadId.KERNEL32 ref: 00409DBB
                          • GetTickCount.KERNEL32 ref: 00409963
                          • GetTickCount.KERNEL32 ref: 0040997B
                          • GetCurrentThreadId.KERNEL32 ref: 004099AA
                          • GetTickCount.KERNEL32 ref: 004099D5
                          • GetTickCount.KERNEL32 ref: 00409A0C
                          • GetTickCount.KERNEL32 ref: 00409A36
                          • GetCurrentThreadId.KERNEL32 ref: 00409AA6
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: 1c999e2f02313124bca4f28fea24c930a350f81f416e63fe2e0a0fa511df7c3d
                          • Instruction ID: 03bd8582b1eb01f38dc3bc03a00dde36fd162c63f8ac2178b870ebcacfb3a5be
                          • Opcode Fuzzy Hash: 1c999e2f02313124bca4f28fea24c930a350f81f416e63fe2e0a0fa511df7c3d
                          • Instruction Fuzzy Hash: 584160716083819ED721AE7CC48471FBAD1AF91354F158A3EE4D8A73D3E7789C808B46
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 005F79A4
                          • IsWindowUnicode.USER32 ref: 005F79B8
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005F79DB
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 005F79F1
                          • TranslateMessage.USER32 ref: 005F7A76
                          • DispatchMessageW.USER32 ref: 005F7A83
                          • DispatchMessageA.USER32 ref: 005F7A8B
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                          • String ID:
                          • API String ID: 2190272339-0
                          • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction ID: 1819d594af2c5eab64940d387a41f49d349f48961b942df89d4b8fbc70f69a18
                          • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction Fuzzy Hash: 3C213A3030C30F76EA3176691C02BBF9FA66FDA744F15485EF6C1A7183C69D9D428116
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C,0065CB9C,?,?,00651C38,00411A03,006508A8), ref: 0040A9E5
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C,0065CB9C,?,?,00651C38,00411A03), ref: 0040A9EB
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,006508A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?,0065CB9C), ref: 0040AA06
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,006508A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,006508A8,00000000,?,0040AA6A,?,?), ref: 0040AA0C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: 24eccb18a2650722d7e9c4feb74e667e100e97daa59a13084b08bac2897d350c
                          • Instruction ID: 51659ce6af3bf560b9a44cb2e5d1bfd6ac9861a49438b10b3f69fd65a2529a45
                          • Opcode Fuzzy Hash: 24eccb18a2650722d7e9c4feb74e667e100e97daa59a13084b08bac2897d350c
                          • Instruction Fuzzy Hash: DBF0C2B079034078E710E3945C0BF5A366D9746B2EF50523BB250BD0C1D6BC44C89B2B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,00406250), ref: 00405A67
                          • Sleep.KERNEL32(0000000A,00000000,?,00406250), ref: 00405A7D
                          • Sleep.KERNEL32(00000000,?,?,?,00406250), ref: 00405AAB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,?,00406250), ref: 00405AC1
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 10920623d5bd0f73485c7f625145375b000f501e6bb48b1f84ce46aa406a9279
                          • Instruction ID: e2bb2d7a972bb427660176896104d2a2a9f6eb7761a28719d4f67168c38934f8
                          • Opcode Fuzzy Hash: 10920623d5bd0f73485c7f625145375b000f501e6bb48b1f84ce46aa406a9279
                          • Instruction Fuzzy Hash: 16C12772600B518FDB19CF69E984717BBA2EB85311F18827FD4059B3D5C3B8A881CF96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetLastError.KERNEL32(h?L,00000004,004C1F90,00000000,004C3D76,?,?,004C1F90,00000001), ref: 004C3D18
                          • GetCurrentThread.KERNEL32 ref: 004C3D50
                          • GetCurrentThreadId.KERNEL32 ref: 004C3D58
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread$ErrorLast
                          • String ID: 4}I$h?L
                          • API String ID: 4172138867-1832910702
                          • Opcode ID: 384057c9ed27486318e0d1cb79d09538608d2e6e48a037c23f98f6c091e1809f
                          • Instruction ID: cde72534dc1b85ed7777d44f99b3923cfe206a8029fa93250547d3539bdf6d9e
                          • Opcode Fuzzy Hash: 384057c9ed27486318e0d1cb79d09538608d2e6e48a037c23f98f6c091e1809f
                          • Instruction Fuzzy Hash: 12216375904741AEC311DF768C41BAABBA5AF4A304F00C53FE81093682EB3DA914C3AD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(005F64D4,00000000), ref: 005F661E
                          • ShowWindow.USER32(?,00000000,005F64D4,00000000), ref: 005F6660
                          • ShowOwnedPopups.USER32(00000000,?), ref: 005F668F
                          • ShowWindow.USER32(?,00000005), ref: 005F6704
                          • ShowOwnedPopups.USER32(00000000,?), ref: 005F6733
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Show$OwnedPopupsWindow$EnumWindows
                          • String ID:
                          • API String ID: 315437064-0
                          • Opcode ID: 4d8a3e18794adedaa74e389caa8746cea8cd8ecb6de7cf9aa85c5c2b889b9ec4
                          • Instruction ID: 9d540ff84875134cf94e77d6bc6f24353aedf2b0752c643ac3729871f7954d28
                          • Opcode Fuzzy Hash: 4d8a3e18794adedaa74e389caa8746cea8cd8ecb6de7cf9aa85c5c2b889b9ec4
                          • Instruction Fuzzy Hash: D4415F30601B458FD720EB38C888BBA77E2FB85358F150979E659CB2A1C778EC85DB41
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhookWindowsHookEx.USER32(00000000), ref: 005F56E6
                          • SetEvent.KERNEL32(00000000), ref: 005F5712
                          • GetCurrentThreadId.KERNEL32 ref: 005F5717
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 005F5740
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 005F574D
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                          • String ID:
                          • API String ID: 2132507429-0
                          • Opcode ID: be6be8d32e9f459414e21e1d34a4732e1830c6d53c973313dd7bf3ca7cb7b1b0
                          • Instruction ID: 8b626208f8899808b6ee2f8f124ee13ad0b37cacd823660b877cb21a46016582
                          • Opcode Fuzzy Hash: be6be8d32e9f459414e21e1d34a4732e1830c6d53c973313dd7bf3ca7cb7b1b0
                          • Instruction Fuzzy Hash: 92018F306456059FE700EBA5DD41B6A77E9AB85314F014939F2A4C61E1EAB89880CB55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0040DD89
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0040DDE7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0040DE44
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0040DE77
                            • Part of subcall function 0040DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0040DDF5), ref: 0040DD4B
                            • Part of subcall function 0040DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0040DDF5), ref: 0040DD68
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: a26d3ba3cebedfc12237a51de21440b4cf2ba9c2b8b936941c76abe64d2c2e17
                          • Instruction ID: aba8d60d3f90c2c419027a019534d1487b5d55c7c4fc269c7a15dd30b25f1070
                          • Opcode Fuzzy Hash: a26d3ba3cebedfc12237a51de21440b4cf2ba9c2b8b936941c76abe64d2c2e17
                          • Instruction Fuzzy Hash: 87317C70E0021A9BDB10EFE9C884AAEB3B5FF14314F40457AE515FB2D1DB789A09CB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetActiveWindow.USER32(?,?,006601D8,005F7DC8), ref: 005F714E
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction ID: 55d906015107a1f6f88df5c28493e177dacb6cd1a3f14b4bdcd2407b3661111c
                          • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction Fuzzy Hash: 55312B706042899BDB54EE6DC8C9BAA3BA67F48304F0454B5BE05DF28BCB78DC85C761
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindow.USER32(?,00000004), ref: 005F64E6
                          • GetWindowThreadProcessId.USER32(?,?), ref: 005F6503
                          • GetCurrentProcessId.KERNEL32(?,00000004), ref: 005F650F
                          • IsWindowVisible.USER32(?), ref: 005F6569
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$Process$CurrentThreadVisible
                          • String ID:
                          • API String ID: 3926708836-0
                          • Opcode ID: 0b87af43373d3896225330ed2514b771849e1e69a9375bd40ce0463a4e2e0ecf
                          • Instruction ID: 92dcea2b484ec88a49d61880b7cc9426234b807fb166ddd0fe1e6ecaa1d3b934
                          • Opcode Fuzzy Hash: 0b87af43373d3896225330ed2514b771849e1e69a9375bd40ce0463a4e2e0ecf
                          • Instruction Fuzzy Hash: B9318E31600209AFDB50DFA9D8C4BBAB7A5FB05314F4451B5EE04E739ADB78ED408B90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(005F61C0), ref: 005F62B1
                          • GetWindow.USER32(00000003,00000003), ref: 005F62C9
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 005F62D6
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 005F6315
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Window$EnumLongWindows
                          • String ID:
                          • API String ID: 4191631535-0
                          • Opcode ID: 81c53c4ca72d230e9ee7fc13719ebccf6833b32577f15cbdc244313b5dd28d99
                          • Instruction ID: 936fbc83c088ac0e8c568c7521c8ea6764f212cdcc539b7f305c1260ebffb7df
                          • Opcode Fuzzy Hash: 81c53c4ca72d230e9ee7fc13719ebccf6833b32577f15cbdc244313b5dd28d99
                          • Instruction Fuzzy Hash: 0B117030704710AFDB10AA18C885FA97B94EF05724F154578FE98AF2D2C7689C84C766
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00533E7D
                          • GetCurrentProcessId.KERNEL32(?,?,00000000,005F985D,?,?,?,00000001,005F7A37), ref: 00533E86
                          • GlobalFindAtomW.KERNEL32(00000000), ref: 00533E9B
                          • GetPropW.USER32(00000000,00000000), ref: 00533EB2
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                          • String ID:
                          • API String ID: 2582817389-0
                          • Opcode ID: f0b9609c593ae1636e81c12c14f89623cad3ab3d3cde2d526b4a0c778bc85e74
                          • Instruction ID: e2a19f9d47b020a096afd139e7a4d43b95e7eea5e09616d6f2802ba2eba2c3b7
                          • Opcode Fuzzy Hash: f0b9609c593ae1636e81c12c14f89623cad3ab3d3cde2d526b4a0c778bc85e74
                          • Instruction Fuzzy Hash: 7DF06573300121B69B21B7B65C8196F6B8CEA143A4701183AFC46D7263D669CDC5A7FC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhandledExceptionFilter.KERNEL32(?,00000000), ref: 0040A1FA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID: hQ@
                          • API String ID: 3192549508-1828285967
                          • Opcode ID: f924984a27f5d0edae11f4708e56f4b05f68107dbb81dc992a22bc56b459c0a2
                          • Instruction ID: aa6cc93045310d53fd7c389dc58617b6b8ea3fe865c8b509ee33e7bb599d98d7
                          • Opcode Fuzzy Hash: f924984a27f5d0edae11f4708e56f4b05f68107dbb81dc992a22bc56b459c0a2
                          • Instruction Fuzzy Hash: 5E4150716043019FD710DB14C884F67B7A5EB85354F1486BEE844AB3A1C739EC91CB6B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 005F7CB5
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005F7CCC
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID: xF^
                          • API String ID: 1378638983-2404611210
                          • Opcode ID: b357195d7b10d99d991bca75f2ddada9ac178ed8482bd189a17648a9a0aae0a1
                          • Instruction ID: d21e12046a352beeef49788b7af9e4ed984a83b07167febe3028f0e682133871
                          • Opcode Fuzzy Hash: b357195d7b10d99d991bca75f2ddada9ac178ed8482bd189a17648a9a0aae0a1
                          • Instruction Fuzzy Hash: 79413E30A04248EFDB04DF68D885AADBBF5FB4D314F6185A5E910DB3A2C7349E41DB10
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 0040A066
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,Function_00009FFC), ref: 0040A0A3
                          Strings
                          Memory Dump Source
                          • Source File: 0000000D.00000002.2231907043.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 0000000D.00000002.2231877820.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2231907043.000000000041C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232167376.0000000000651000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232191925.0000000000652000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232229375.0000000000653000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232272158.0000000000656000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232315702.0000000000658000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232353727.000000000065F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232433822.0000000000663000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232479443.0000000000665000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000666000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000D.00000002.2232566905.0000000000668000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_13_2_400000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID: hQ@
                          • API String ID: 3192549508-1828285967
                          • Opcode ID: a25b8c03576c17391c850c5f64513a22ec4468a6f63667f0fb9026cb1f0c0a0c
                          • Instruction ID: 8c2c3fa0e60ec44e0d59dfacab71d8ccaf55b5c85c84586d68bf492c0d4e74bc
                          • Opcode Fuzzy Hash: a25b8c03576c17391c850c5f64513a22ec4468a6f63667f0fb9026cb1f0c0a0c
                          • Instruction Fuzzy Hash: B6315070604304AFD720DF14C884F2777E9EB88754F15856AE4449B391C738EC95CB6B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:2.8%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:175
                          Total number of Limit Nodes:10
                          execution_graph 9150 46b0898 9153 44719b8 9150->9153 9152 46b08a8 9155 44719c3 9153->9155 9157 446a6f8 9155->9157 9158 446a707 9157->9158 9159 446a70c GetCurrentThreadId 9157->9159 9158->9159 9160 446a742 9159->9160 9161 446aa44 9160->9161 9162 446a7b5 9160->9162 9163 446aa60 9161->9163 9164 446aa71 9161->9164 9176 446a68c 9162->9176 9180 446a9ac 9163->9180 9166 446aa7a GetCurrentThreadId 9164->9166 9171 446aa87 9164->9171 9166->9171 9169 446aa6a 9169->9164 9170 4466f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9170->9171 9171->9170 9172 446ab17 FreeLibrary 9171->9172 9173 446ab3f 9171->9173 9172->9171 9174 446ab4e ExitProcess 9173->9174 9175 446ab48 9173->9175 9175->9174 9177 446a6d4 9176->9177 9178 446a69c 9176->9178 9177->9152 9178->9177 9186 44702f4 GetSystemInfo 9178->9186 9182 446aa13 9180->9182 9183 446a9b6 GetStdHandle WriteFile 9180->9183 9182->9169 9187 446b5b8 9183->9187 9185 446aa03 GetStdHandle WriteFile 9185->9169 9186->9178 9188 446b5be 9187->9188 9188->9185 9189 44659b0 9190 4465c10 9189->9190 9192 44659c8 9189->9192 9191 4465d28 9190->9191 9193 4465bd4 9190->9193 9194 4465d31 9191->9194 9195 446575c VirtualAlloc 9191->9195 9196 44659da 9192->9196 9204 4465a65 Sleep 9192->9204 9200 4465bee Sleep 9193->9200 9205 4465c2e 9193->9205 9198 4465797 9195->9198 9199 4465787 9195->9199 9197 44659e9 9196->9197 9202 4465ac8 9196->9202 9206 4465aa9 Sleep 9196->9206 9213 4465710 9199->9213 9203 4465c04 Sleep 9200->9203 9200->9205 9212 4465ad4 9202->9212 9218 4465694 9202->9218 9203->9193 9204->9196 9208 4465a7b Sleep 9204->9208 9207 4465694 VirtualAlloc 9205->9207 9210 4465c4c 9205->9210 9206->9202 9209 4465abf Sleep 9206->9209 9207->9210 9208->9192 9209->9196 9214 4465758 9213->9214 9215 4465719 9213->9215 9214->9198 9215->9214 9216 4465724 Sleep 9215->9216 9216->9214 9217 446573e Sleep 9216->9217 9217->9215 9222 4465628 9218->9222 9220 446569d VirtualAlloc 9221 44656b4 9220->9221 9221->9212 9223 44655c8 9222->9223 9223->9220 9224 446d658 9225 446d684 9224->9225 9226 446d668 GetModuleFileNameW 9224->9226 9228 446e8cc GetModuleFileNameW 9226->9228 9229 446e91a 9228->9229 9234 446e7a8 9229->9234 9231 446e946 9232 446e958 LoadLibraryExW 9231->9232 9233 446e960 9231->9233 9232->9233 9233->9225 9237 446e7c9 9234->9237 9235 446e851 9235->9231 9237->9235 9252 446e4e4 9237->9252 9238 446e83e 9239 446e844 9238->9239 9240 446e853 GetUserDefaultUILanguage 9238->9240 9242 446e610 2 API calls 9239->9242 9256 446de94 EnterCriticalSection 9240->9256 9242->9235 9243 446e860 9276 446e610 9243->9276 9245 446e86d 9246 446e895 9245->9246 9247 446e87b GetSystemDefaultUILanguage 9245->9247 9246->9235 9280 446e6dc 9246->9280 9248 446de94 17 API calls 9247->9248 9250 446e888 9248->9250 9251 446e610 2 API calls 9250->9251 9251->9246 9253 446e506 9252->9253 9255 446e510 9252->9255 9288 446e1c8 9253->9288 9255->9238 9257 446dee0 LeaveCriticalSection 9256->9257 9258 446dec0 9256->9258 9325 446ad14 9257->9325 9260 446ded1 LeaveCriticalSection 9258->9260 9270 446df82 9260->9270 9261 446def1 IsValidLocale 9262 446df00 9261->9262 9263 446df4f EnterCriticalSection 9261->9263 9265 446df14 9262->9265 9266 446df09 9262->9266 9264 446df67 9263->9264 9271 446df78 LeaveCriticalSection 9264->9271 9340 446db7c 9265->9340 9327 446dd78 GetThreadUILanguage 9266->9327 9269 446df1d GetSystemDefaultUILanguage 9269->9263 9272 446df27 9269->9272 9270->9243 9271->9270 9273 446df38 GetSystemDefaultUILanguage 9272->9273 9274 446db7c 3 API calls 9273->9274 9275 446df12 9274->9275 9275->9263 9277 446e62e 9276->9277 9278 446e6a9 9277->9278 9349 446e5a4 9277->9349 9278->9245 9354 446adf8 9280->9354 9283 446e72c 9284 446e5a4 2 API calls 9283->9284 9285 446e740 9284->9285 9286 446e76e 9285->9286 9287 446e5a4 2 API calls 9285->9287 9286->9235 9287->9286 9289 446e1df 9288->9289 9290 446e1f3 GetModuleFileNameW 9289->9290 9291 446e208 9289->9291 9290->9291 9292 446e230 RegOpenKeyExW 9291->9292 9297 446e3d7 9291->9297 9293 446e257 RegOpenKeyExW 9292->9293 9294 446e2f1 9292->9294 9293->9294 9295 446e275 RegOpenKeyExW 9293->9295 9309 446dfd8 GetModuleHandleW 9294->9309 9295->9294 9298 446e293 RegOpenKeyExW 9295->9298 9297->9255 9298->9294 9302 446e2b1 RegOpenKeyExW 9298->9302 9299 446e30f RegQueryValueExW 9300 446e360 RegQueryValueExW 9299->9300 9301 446e32d 9299->9301 9303 446e37c 9300->9303 9308 446e35e 9300->9308 9305 446e335 RegQueryValueExW 9301->9305 9302->9294 9304 446e2cf RegOpenKeyExW 9302->9304 9306 446e384 RegQueryValueExW 9303->9306 9304->9294 9304->9297 9305->9308 9306->9308 9307 446e3c6 RegCloseKey 9307->9255 9308->9307 9310 446e000 GetProcAddress 9309->9310 9311 446e011 9309->9311 9310->9311 9313 446e027 9311->9313 9317 446e073 9311->9317 9321 446dfb4 9311->9321 9313->9299 9315 446dfb4 CharNextW 9315->9317 9316 446dfb4 CharNextW 9316->9317 9317->9313 9317->9316 9318 446e0f8 FindFirstFileW 9317->9318 9320 446e162 lstrlenW 9317->9320 9318->9313 9319 446e114 FindClose lstrlenW 9318->9319 9319->9313 9319->9317 9320->9317 9322 446dfc2 9321->9322 9323 446dfd0 9322->9323 9324 446dfba CharNextW 9322->9324 9323->9313 9323->9315 9324->9322 9326 446ad1a 9325->9326 9326->9261 9328 446dd94 9327->9328 9329 446dded 9327->9329 9345 446dd34 GetThreadPreferredUILanguages 9328->9345 9331 446dd34 2 API calls 9329->9331 9336 446ddf5 9331->9336 9333 446de3c SetThreadPreferredUILanguages 9335 446dd34 2 API calls 9333->9335 9337 446de52 9335->9337 9336->9333 9339 446de7d 9336->9339 9338 446de6d SetThreadPreferredUILanguages 9337->9338 9337->9339 9338->9339 9339->9275 9341 446dbb7 9340->9341 9342 446dc20 IsValidLocale 9341->9342 9344 446dc6e 9341->9344 9343 446dc33 GetLocaleInfoW GetLocaleInfoW 9342->9343 9342->9344 9343->9344 9344->9269 9346 446dd55 9345->9346 9347 446dd6e SetThreadPreferredUILanguages 9345->9347 9348 446dd5e GetThreadPreferredUILanguages 9346->9348 9347->9329 9348->9347 9350 446e5b9 9349->9350 9351 446e5d6 FindFirstFileW 9350->9351 9352 446e5e6 FindClose 9351->9352 9353 446e5ec 9351->9353 9352->9353 9353->9277 9355 446adfc GetUserDefaultUILanguage GetLocaleInfoW 9354->9355 9355->9283

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0446E79C,?,?), ref: 0446E70E
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0446E79C,?,?), ref: 0446E717
                            • Part of subcall function 0446E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,0446E602,?,00000001), ref: 0446E5D7
                            • Part of subcall function 0446E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,0446E602,?,00000001), ref: 0446E5E7
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: a43ac250cb0eac07fa7aa6a541b52dbaa6491d3871c472b106d44298392fd5d0
                          • Instruction ID: d75cb1b16cab068e18cbc8e3d2aff048c2fef9d835bcaf128585b5c791169a5b
                          • Opcode Fuzzy Hash: a43ac250cb0eac07fa7aa6a541b52dbaa6491d3871c472b106d44298392fd5d0
                          • Instruction Fuzzy Hash: B011A574A001099BEF00EFAAD890AAEB3F9EF44304F60007B9506E3252DB707E048A63
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,0446E602,?,00000001), ref: 0446E5D7
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,0446E602,?,00000001), ref: 0446E5E7
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 7ee96a0f5bcbc1246ae8bd1c53f4c467e34f4b1571f793fa5715a3d294efbad9
                          • Instruction ID: 54e270da36a4b721dcd8b75142672bfa6dd89d2f9f0893acf78077e2eb16140b
                          • Opcode Fuzzy Hash: 7ee96a0f5bcbc1246ae8bd1c53f4c467e34f4b1571f793fa5715a3d294efbad9
                          • Instruction Fuzzy Hash: 4BF0B474914654AFDF10EB75DD1688EB7ECEB452187B004A6E405E3151E634BF009916
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0446E3ED,?,?), ref: 0446E201
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0446E3ED,?,?), ref: 0446E24A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0446E3ED,?,?), ref: 0446E26C
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0446E28A
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0446E2A8
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0446E2C6
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0446E2E4
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0446E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0446E3ED), ref: 0446E324
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0446E3D0,?,80000001), ref: 0446E34F
                          • RegCloseKey.ADVAPI32(?,0446E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0446E3D0,?,80000001,Software\Embarcadero\Locales), ref: 0446E3CA
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 063a9725360a2323d5c8764cfabea37e25a7beb0e245f028295a8f45742d9826
                          • Instruction ID: 74070de65c3d49a9489b3649b27d76267821e9b78d8f41d24216e32f5e4f0aa1
                          • Opcode Fuzzy Hash: 063a9725360a2323d5c8764cfabea37e25a7beb0e245f028295a8f45742d9826
                          • Instruction Fuzzy Hash: 5851F475B40208BFFF10DBA5CC41FAEB3ECDB48704F604467BA06F6185DAB0B9449A56
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • EnterCriticalSection.KERNEL32(046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF,?,?,00000000,00000000,00000000), ref: 0446DEB2
                          • LeaveCriticalSection.KERNEL32(046BCC14,046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF,?,?,00000000,00000000), ref: 0446DED6
                          • LeaveCriticalSection.KERNEL32(046BCC14,046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF,?,?,00000000,00000000), ref: 0446DEE5
                          • IsValidLocale.KERNEL32(00000000,00000002,046BCC14,046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF), ref: 0446DEF7
                          • EnterCriticalSection.KERNEL32(046BCC14,00000000,00000002,046BCC14,046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF), ref: 0446DF54
                          • LeaveCriticalSection.KERNEL32(046BCC14,046BCC14,00000000,00000002,046BCC14,046BCC14,00000000,0446DF98,?,?,?,00000000,?,0446E860,00000000,0446E8BF), ref: 0446DF7D
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: c17ab61a5cb3eacb6963272e08d22faa12d1d5c8154f2a083f3b1abd789460cf
                          • Instruction ID: f9c5ce10b02cb24a414182f42899c260708895e1fc66012fc516e26711fb4b17
                          • Opcode Fuzzy Hash: c17ab61a5cb3eacb6963272e08d22faa12d1d5c8154f2a083f3b1abd789460cf
                          • Instruction Fuzzy Hash: 0E21C6E0F007506BFF15F67BA8116992186DF4564DB50442FA0439B246EBB4BD808BA3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 446a6f8-446a705 68 446a707 67->68 69 446a70c-446a740 GetCurrentThreadId 67->69 68->69 70 446a744-446a770 call 446a5dc 69->70 71 446a742 69->71 74 446a772-446a774 70->74 75 446a779-446a780 70->75 71->70 74->75 76 446a776 74->76 77 446a782-446a785 75->77 78 446a78a-446a790 75->78 76->75 77->78 79 446a795-446a79c 78->79 80 446a792 78->80 81 446a79e-446a7a5 79->81 82 446a7ab-446a7af 79->82 80->79 81->82 83 446aa44-446aa5e 82->83 84 446a7b5 call 446a68c 82->84 85 446aa60-446aa6c call 446a924 call 446a9ac 83->85 86 446aa71-446aa78 83->86 91 446a7ba 84->91 85->86 89 446aa7a-446aa85 GetCurrentThreadId 86->89 90 446aa9b-446aa9f 86->90 89->90 93 446aa87-446aa96 call 446a5fc call 446a980 89->93 94 446aaa1-446aaa5 90->94 95 446aab9-446aabd 90->95 93->90 94->95 100 446aaa7-446aab7 94->100 96 446aabf-446aac2 95->96 97 446aac9-446aacd 95->97 96->97 101 446aac4-446aac6 96->101 102 446aacf-446aad8 call 4466f7c 97->102 103 446aaec-446aaf5 call 446a624 97->103 100->95 101->97 102->103 112 446aada-446aaea call 4468ea8 call 4466f7c 102->112 113 446aaf7-446aafa 103->113 114 446aafc-446ab01 103->114 112->103 113->114 115 446ab1d-446ab28 call 446a5fc 113->115 114->115 116 446ab03-446ab11 call 446eaec 114->116 125 446ab2d-446ab31 115->125 126 446ab2a 115->126 116->115 124 446ab13-446ab15 116->124 124->115 128 446ab17-446ab18 FreeLibrary 124->128 129 446ab33-446ab35 call 446a980 125->129 130 446ab3a-446ab3d 125->130 126->125 128->115 129->130 132 446ab56-446ab67 130->132 133 446ab3f-446ab46 130->133 132->95 134 446ab4e-446ab51 ExitProcess 133->134 135 446ab48 133->135 135->134
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 0446A72F
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentThread
                          • String ID:
                          • API String ID: 2882836952-0
                          • Opcode ID: 25de82499f6b20f4476876a0156a1f333a8c48fdf8ae7b1cb8b3e2701feda964
                          • Instruction ID: c598594d3b7c200f3a4682230f07294b10f188b8ad6e7ae1c6fe9a7e48033e18
                          • Opcode Fuzzy Hash: 25de82499f6b20f4476876a0156a1f333a8c48fdf8ae7b1cb8b3e2701feda964
                          • Instruction Fuzzy Hash: D6517A74600A049FEF249F69D48479B77E4EB0A319F14852FE846BB342D778F884CB92
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,0446E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0446E946,00000000,?,00000105), ref: 0446E853
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,0446E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0446E946,00000000,?,00000105), ref: 0446E87B
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: 519a7ee374efab04cd8daed5291d218ef70245e389f8fab6b1a9feaee403d8ed
                          • Instruction ID: aeb807d4d741c4d40d8c642d26fbc4adc21981f136386f60affd665dd40a0f45
                          • Opcode Fuzzy Hash: 519a7ee374efab04cd8daed5291d218ef70245e389f8fab6b1a9feaee403d8ed
                          • Instruction Fuzzy Hash: 34312E78E006199FEF10EF9AC880AAEB7F5EF44304F60446BD416A7251DBB4BD41CB52
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0446E986,?,04460000,046B1C1C), ref: 0446E908
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0446E986,?,04460000,046B1C1C), ref: 0446E959
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: a9d56ecaf80f3a3b72b2724babbf9b54ce2c57ef5a2505151d2c100d238f2dae
                          • Instruction ID: 0eccb240a9cfa77b0936c478d1a22dd5ea90ebafbd46ee75b718b4ba90806894
                          • Opcode Fuzzy Hash: a9d56ecaf80f3a3b72b2724babbf9b54ce2c57ef5a2505151d2c100d238f2dae
                          • Instruction Fuzzy Hash: 2A119474A4061CABEF14DF50CC85BDEB3B8DB04704F5104BBA509A3251DA706F84CE96
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 226 446d658-446d666 227 446d693-446d69e 226->227 228 446d668-446d67f GetModuleFileNameW call 446e8cc 226->228 230 446d684-446d68b 228->230 230->227 231 446d68d-446d690 230->231 231->227
                          APIs
                          • GetModuleFileNameW.KERNEL32(04460000,?,0000020A), ref: 0446D676
                            • Part of subcall function 0446E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0446E986,?,04460000,046B1C1C), ref: 0446E908
                            • Part of subcall function 0446E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0446E986,?,04460000,046B1C1C), ref: 0446E959
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction ID: abfe868408b43ec063caee324ba95c7d8ca2de21c8a3dda3ef685c39325f22bc
                          • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                          • Instruction Fuzzy Hash: 19E0C9B1A003119BDF10DE58D8C4A4637D4AB08654F044966ED19CF34AD371E91487D2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 232 44702f4-4470304 GetSystemInfo
                          APIs
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: InfoSystem
                          • String ID:
                          • API String ID: 31276548-0
                          • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction ID: 33a875841f4dedc0d4c40fcd5a3696cef20f4776c39a0a0c59e85da578b70173
                          • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                          • Instruction Fuzzy Hash: 55A012104084005ACC04E7195C4240B71801940114FC40214645D95292E61699680AD7
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 233 4465694-44656b2 call 4465628 VirtualAlloc 236 44656b4-4465701 233->236 237 4465702-446570d 233->237
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,04465CAB,?,04466250), ref: 044656AB
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 156c49f446fbdf062623de6eee25ebae88f0b556ef64de5e550928574db53764
                          • Instruction ID: 34fa5fb2484af2612e6be2a0d590cb0fb4cacec747c19df79e8003a47aeeb54a
                          • Opcode Fuzzy Hash: 156c49f446fbdf062623de6eee25ebae88f0b556ef64de5e550928574db53764
                          • Instruction Fuzzy Hash: 0BF08CF2B413015BEB188FB8AA407427BD4E708354F10413EE949EB784E7B498808790
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 347 446dfd8-446dffe GetModuleHandleW 348 446e000-446e00f GetProcAddress 347->348 349 446e03d-446e044 347->349 348->349 350 446e011-446e025 348->350 351 446e046-446e04e 349->351 352 446e081-446e084 349->352 350->349 361 446e027-446e038 call 446d9fc 350->361 354 446e054-446e065 call 446dfb4 351->354 355 446e18e-446e197 351->355 353 446e087-446e08e 352->353 356 446e093-446e09b 353->356 357 446e090 353->357 354->355 365 446e06b-446e079 call 446dfb4 354->365 356->355 360 446e0a1-446e0b1 call 446d9fc 356->360 357->356 369 446e173-446e177 360->369 361->355 365->355 373 446e07f 365->373 371 446e0b6-446e0c6 call 446dfb4 369->371 372 446e17d-446e189 call 446d9fc 369->372 377 446e0cb-446e0d3 371->377 378 446e0c8 371->378 372->355 373->353 377->355 379 446e0d9-446e0eb 377->379 378->377 380 446e0f0-446e112 call 446d9fc FindFirstFileW 379->380 381 446e0ed 379->381 380->355 384 446e114-446e134 FindClose lstrlenW 380->384 381->380 384->355 385 446e136-446e171 call 446d9fc lstrlenW 384->385 385->369
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 0446DFF5
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0446E006
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 0446E106
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 0446E118
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 0446E124
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 0446E169
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: 713df2b4636c10b20f94a1a6d19ff041a5e1d5b291625b85fc0e688654a8057f
                          • Instruction ID: 5d6389ab89c58d2b5a5c23a68f78cd803281aa3c7a3537480101aa469c31799f
                          • Opcode Fuzzy Hash: 713df2b4636c10b20f94a1a6d19ff041a5e1d5b291625b85fc0e688654a8057f
                          • Instruction Fuzzy Hash: DE419275E006189BDF24DE98CC84ADEB3F6AF44314F2485AAC506E7245E774BF458F82
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowLongW.USER32(?,000000EC), ref: 0464A98E
                          • IsIconic.USER32(?), ref: 0464A9BC
                          • IsWindowVisible.USER32(?), ref: 0464A9CC
                          • ShowWindow.USER32(?,00000000,00000000,?,?,?,04657CEF,?,046C01D8), ref: 0464A9E9
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0464A9FC
                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0464AA0D
                          • ShowWindow.USER32(?,00000006,00000000,?,?,?,04657CEF,?,046C01D8), ref: 0464AA2D
                          • ShowWindow.USER32(?,00000005,00000000,?,?,?,04657CEF,?,046C01D8), ref: 0464AA37
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Window$LongShow$IconicVisible
                          • String ID:
                          • API String ID: 3484284227-0
                          • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction ID: 4c2640c8056eec0dd6fe7a1241456ca64f2283b8c1822352a52b7c780557f73a
                          • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                          • Instruction Fuzzy Hash: DB112E0119D6D038EF2276A60C01FEF2D994FE3365F19852EF8C4912C3E21971478366
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 289 4467948-4467962 290 4467964-4467967 289->290 291 4467973-4467984 289->291 293 4467986-4467997 290->293 294 4467969-446796c 290->294 292 44679aa-44679b6 291->292 295 4467a60-4467a80 CreateFileW 292->295 296 44679bc-44679c0 292->296 293->292 297 446796e 294->297 298 4467999-44679a3 294->298 300 4467a94-4467a9c 295->300 301 4467a82-4467a8f GetLastError 295->301 302 44679d2-44679df 296->302 303 44679c2-44679cb 296->303 299 4467bab-4467bb1 297->299 298->292 304 4467b64-4467b6c 300->304 305 4467aa2-4467ab7 GetFileSize 300->305 301->299 306 44679e1-44679e7 302->306 307 44679ff-4467a06 GetStdHandle 302->307 303->302 312 4467b6e-4467b75 304->312 313 4467b7c-4467b82 304->313 308 4467ac7-4467acf 305->308 309 4467ab9-4467ac2 call 4467930 305->309 310 44679f0 306->310 311 44679e9-44679ee 306->311 314 4467a08-4467a10 307->314 317 4467ad3-4467ae1 SetFilePointer 308->317 318 4467ad1 308->318 309->299 316 44679f5-44679fd GetStdHandle 310->316 311->316 312->313 313->299 320 4467b84-4467b8f GetFileType 313->320 314->313 319 4467a16-4467a21 GetFileType 314->319 316->314 322 4467b02-4467b0b call 4467930 317->322 323 4467ae3-4467b00 ReadFile 317->323 318->317 324 4467a23-4467a29 319->324 325 4467a4d-4467a5b 319->325 326 4467b96-4467ba2 call 4467930 320->326 327 4467b91-4467b92 320->327 322->299 323->322 331 4467b10-4467b14 323->331 333 4467a3c-4467a48 GetConsoleCP 324->333 334 4467a2b-4467a37 GetConsoleOutputCP 324->334 325->313 326->299 328 4467ba4 327->328 329 4467b94 327->329 328->299 329->299 331->304 335 4467b16-4467b1a 331->335 333->313 334->313 335->304 338 4467b1c-4467b22 335->338 338->304 339 4467b24-4467b27 338->339 340 4467b2d-4467b30 339->340 341 4467b32-4467b46 SetFilePointer 340->341 342 4467b5f-4467b62 340->342 343 4467b54-4467b5d call 4467930 341->343 344 4467b48-4467b52 SetEndOfFile 341->344 342->304 342->340 343->299 344->304 344->343
                          APIs
                          • GetStdHandle.KERNEL32(FFFFFFF5), ref: 044679F6
                          • GetStdHandle.KERNEL32(000000F6), ref: 04467A01
                          • GetFileType.KERNEL32(00000000), ref: 04467A19
                          • GetConsoleOutputCP.KERNEL32(00000000), ref: 04467A2B
                          • GetConsoleCP.KERNEL32(00000000), ref: 04467A3C
                          • GetFileType.KERNEL32(00000000), ref: 04467B87
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: ConsoleFileHandleType$Output
                          • String ID:
                          • API String ID: 393880136-0
                          • Opcode ID: 304a2c6923b67241f096c2a0855e5413a3cd26a97ff1fc1e2543b57e66f6c6ca
                          • Instruction ID: 74c8830802aa587f487456070e0c77676bc6f2292bc15cc3e1063b40f5c30c24
                          • Opcode Fuzzy Hash: 304a2c6923b67241f096c2a0855e5413a3cd26a97ff1fc1e2543b57e66f6c6ca
                          • Instruction Fuzzy Hash: 8951A270610600AAFF20EF6988C476736A8EF4475CF14866BD8578F386E734F94587A7
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 044696B9
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 044696BF
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 044696D2
                          • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 044696DB
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,04469752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04469706
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: 87d680c7574a074e55d4c1e2bad54e127d48d7162bc8c1d55d75b0e9051391fc
                          • Instruction ID: eff18de8b295a171e332fbc81f1730bc8cd61639e4bb7fbeee0d1367fead8c1d
                          • Opcode Fuzzy Hash: 87d680c7574a074e55d4c1e2bad54e127d48d7162bc8c1d55d75b0e9051391fc
                          • Instruction Fuzzy Hash: 581130B1D00208EBEF50EFA6D94569EB7A8EB44306F5481ABD516A7241D6B4BA408B13
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04471ABC
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 68e18409beab9bc4c3ea23df82b59559e92bcdecc6bc73843f316a535f85601c
                          • Instruction ID: c5de3c2efce0bc0f0bf0f645191c65e1188ffc2f324ffe148b4ed1517be336e2
                          • Opcode Fuzzy Hash: 68e18409beab9bc4c3ea23df82b59559e92bcdecc6bc73843f316a535f85601c
                          • Instruction Fuzzy Hash: 67A14175A002099FEF25DFE9D480BEEBBB5FB48310F14411AE505AB380EB74B986CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04496E69
                          • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04496E85
                          • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04496EBE
                          • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04496F3B
                          • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04496F54
                          • VariantCopy.OLEAUT32(?), ref: 04496F89
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                          • String ID:
                          • API String ID: 351091851-3916222277
                          • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction ID: 9cbee27dd2f5c5760a61c07bca52ab6b5bb4e9f367533bf002cc2e6a798d89b0
                          • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                          • Instruction Fuzzy Hash: D4512C7590062D9FDF22DF59CC80ADABBFCAF48204F0142DAE508E7206D630AF859F64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,044659A6), ref: 04465DCA
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,044659A6), ref: 04465DE4
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: a8b6be15c5678f8f909dc6b9b13668965497e8a619cfc84d619880003453b682
                          • Instruction ID: 39e28e1758567542a2589d8a1f5ca9321d738df5e714f621a61c6b4e385e34eb
                          • Opcode Fuzzy Hash: a8b6be15c5678f8f909dc6b9b13668965497e8a619cfc84d619880003453b682
                          • Instruction Fuzzy Hash: 20710471604700AFEF25CF69E98471ABBD4EB45714F18866FD44A8B3C2E6B4A881C793
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetCapture.USER32 ref: 04657752
                          • IsWindowUnicode.USER32(00000000), ref: 04657795
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 046577B0
                          • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 046577CF
                          • GetWindowThreadProcessId.USER32(00000000), ref: 046577DE
                          • GetWindowThreadProcessId.USER32(?,?), ref: 046577EF
                          • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 0465780F
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                          • String ID:
                          • API String ID: 1994056952-0
                          • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction ID: 436837d039117676f4c7502d6bc589616864393371e0dbc1af6fc2f501c34a4f
                          • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                          • Instruction Fuzzy Hash: F9215A71204709AFEB60EE59DD80FAB73DCDF24225F158869ED69C3262FB10F8028765
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 478ea5f3cc04447aff2149fedad83a57d61206996502e75015336cf4ac2b7a5c
                          • Instruction ID: 96f2489bd1ef0964e2118b4a990fd243cfc09243dd7448feab0719f5a4d89464
                          • Opcode Fuzzy Hash: 478ea5f3cc04447aff2149fedad83a57d61206996502e75015336cf4ac2b7a5c
                          • Instruction Fuzzy Hash: E8C12A727102001BEF14DE7DED8876EB3869BC4325F18863FE156CB386EA78E8458752
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 04469DB8: GetCurrentThreadId.KERNEL32 ref: 04469DBB
                          • GetTickCount.KERNEL32 ref: 04469963
                          • GetTickCount.KERNEL32 ref: 0446997B
                          • GetCurrentThreadId.KERNEL32 ref: 044699AA
                          • GetTickCount.KERNEL32 ref: 044699D5
                          • GetTickCount.KERNEL32 ref: 04469A0C
                          • GetTickCount.KERNEL32 ref: 04469A36
                          • GetCurrentThreadId.KERNEL32 ref: 04469AA6
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: a1037a3a5e1c386fd7d7e74f2542ab34f880bf026ee65fbb75ee1d25d861cac8
                          • Instruction ID: f4848cce8763f616de70d05b59bda7a354f38807bc060c5d15a3c1196f18e29c
                          • Opcode Fuzzy Hash: a1037a3a5e1c386fd7d7e74f2542ab34f880bf026ee65fbb75ee1d25d861cac8
                          • Instruction Fuzzy Hash: 634161B12083819EEF21EE7CC58435FBBD1AF81354F14892ED4DA87385EBB5A4858753
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 046579A4
                          • IsWindowUnicode.USER32 ref: 046579B8
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 046579DB
                          • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 046579F1
                          • TranslateMessage.USER32 ref: 04657A76
                          • DispatchMessageW.USER32 ref: 04657A83
                          • DispatchMessageA.USER32 ref: 04657A8B
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                          • String ID:
                          • API String ID: 2190272339-0
                          • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction ID: ec3c0c6899188cd9238d4a333581b1b866552467a0c01155a05516df5d3d8c21
                          • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                          • Instruction Fuzzy Hash: 5F21E63434474276FF316A6A1C04BAE578A4FF270BF14885EEC81D72A2F696B5174226
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,046B08A8,00000000,?,0446AA6A,?,?,046BCB9C,046BCB9C,?,?,046B1C38,04471A03,046B08A8), ref: 0446A9E5
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,046B08A8,00000000,?,0446AA6A,?,?,046BCB9C,046BCB9C,?,?,046B1C38,04471A03), ref: 0446A9EB
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,046B08A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,046B08A8,00000000,?,0446AA6A,?,?,046BCB9C), ref: 0446AA06
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,046B08A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,046B08A8,00000000,?,0446AA6A,?,?), ref: 0446AA0C
                          Strings
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: aac1981fc2357fd32eb21643d1abe958e1702b29339b27dcc95e58b12f01fdac
                          • Instruction ID: 3882a04559ff858161e6248ee3c5a56a506f680320f28f979334b185f6bef650
                          • Opcode Fuzzy Hash: aac1981fc2357fd32eb21643d1abe958e1702b29339b27dcc95e58b12f01fdac
                          • Instruction Fuzzy Hash: 84F0FC706847407AFF10BB946C06FD9215CD703B19F50010BB191B50C5EAB878C45BA3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0446629A
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 044662A0
                          • GetStdHandle.KERNEL32(000000F4,044653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 044662BF
                          • WriteFile.KERNEL32(00000000,000000F4,044653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 044662C5
                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,044653E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 044662DC
                          • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,044653E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 044662E2
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID:
                          • API String ID: 3320372497-0
                          • Opcode ID: bd00bdcdd2440603bfe163efd791e702a779756a96b9b5061a8886cbb837cecc
                          • Instruction ID: f9def43972e75a2ffd0b8b6bfc54236ab032be0d9a9acd82be62a3f8cef0420f
                          • Opcode Fuzzy Hash: bd00bdcdd2440603bfe163efd791e702a779756a96b9b5061a8886cbb837cecc
                          • Instruction Fuzzy Hash: F001A9D12546243DFA10F6BAAC84F5F6A8CCF05A68F00062B7216D61C7D974BC4483F3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • Sleep.KERNEL32(00000000,?,04466250), ref: 04465A67
                          • Sleep.KERNEL32(0000000A,00000000,?,04466250), ref: 04465A7D
                          • Sleep.KERNEL32(00000000,?,?,?,04466250), ref: 04465AAB
                          • Sleep.KERNEL32(0000000A,00000000,?,?,?,04466250), ref: 04465AC1
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: d97117a39cff7c4325960ec352705076e13b636f4b830838aa29045d371469ba
                          • Instruction ID: 914e9590deb33876cc3aebf3c2a2c8d3a0d19f0cddd1cd11271b1f98b17fad78
                          • Opcode Fuzzy Hash: d97117a39cff7c4325960ec352705076e13b636f4b830838aa29045d371469ba
                          • Instruction Fuzzy Hash: 4CC137726012519FDF19CF69F584326BBE1EB85314F18826FD0568B385E7B4A881C7E2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(046564D4,00000000), ref: 0465661E
                          • ShowWindow.USER32(?,00000000,046564D4,00000000), ref: 04656660
                          • ShowOwnedPopups.USER32(00000000,?), ref: 0465668F
                          • ShowWindow.USER32(?,00000005), ref: 04656704
                          • ShowOwnedPopups.USER32(00000000,?), ref: 04656733
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Show$OwnedPopupsWindow$EnumWindows
                          • String ID:
                          • API String ID: 315437064-0
                          • Opcode ID: 95fa1ab4d56eec5f2bbf68ca4b6dd5bcf02eba8438f48b221965497aefaad639
                          • Instruction ID: e3d7321cacb61a1f6feecb0e40ac00b38e90df36f52c7661a52255e0f701db0f
                          • Opcode Fuzzy Hash: 95fa1ab4d56eec5f2bbf68ca4b6dd5bcf02eba8438f48b221965497aefaad639
                          • Instruction Fuzzy Hash: AF414134700B418FEB20DB38C484BAA73E6FB94328F454969D86D873A1E774B885DB42
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • UnhookWindowsHookEx.USER32(00000000), ref: 046556E6
                          • SetEvent.KERNEL32(00000000), ref: 04655712
                          • GetCurrentThreadId.KERNEL32 ref: 04655717
                          • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 04655740
                          • CloseHandle.KERNEL32(00000000,00000000), ref: 0465574D
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                          • String ID:
                          • API String ID: 2132507429-0
                          • Opcode ID: 8dffcf4a613f1574ee49bf24150205328a525e5c9cd6267cbd00bf94bb59fed5
                          • Instruction ID: ead037d41c1019d1006ebdc29b36bcd6d73c72b6cf9df616434ef830fa476887
                          • Opcode Fuzzy Hash: 8dffcf4a613f1574ee49bf24150205328a525e5c9cd6267cbd00bf94bb59fed5
                          • Instruction Fuzzy Hash: DE01A730644701EFE700EFE5C944B6673D9EB00328F014519A564C72E5F734B845CF15
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0446DD89
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0446DDE7
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0446DE44
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0446DE77
                            • Part of subcall function 0446DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0446DDF5), ref: 0446DD4B
                            • Part of subcall function 0446DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0446DDF5), ref: 0446DD68
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 6b08d12f9da7f9535e416ec1e59955237bc65a33c20e3807f1ab7fc105593301
                          • Instruction ID: b5157aa5fdc772d7d9069e71782cdc8ec29a6263c66732372e5b2340ffd697ee
                          • Opcode Fuzzy Hash: 6b08d12f9da7f9535e416ec1e59955237bc65a33c20e3807f1ab7fc105593301
                          • Instruction Fuzzy Hash: 383152B0F001199BEF10EFA9C8806EEB3B4FF54304F50456BD512D7251E774AA45CB92
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindow.USER32(?,00000004), ref: 046564E6
                          • GetWindowThreadProcessId.USER32(?,?), ref: 04656503
                          • GetCurrentProcessId.KERNEL32(?,00000004), ref: 0465650F
                          • IsWindowVisible.USER32(?), ref: 04656569
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Window$Process$CurrentThreadVisible
                          • String ID:
                          • API String ID: 3926708836-0
                          • Opcode ID: 28e09b1d2836e62d6772c74552a828ff87bb943771376d50285d3e7d8803aca0
                          • Instruction ID: e3e385b001eba5c7c9c333db4db4cc7a1cb7029503886e2c657fe91088de8a7d
                          • Opcode Fuzzy Hash: 28e09b1d2836e62d6772c74552a828ff87bb943771376d50285d3e7d8803aca0
                          • Instruction Fuzzy Hash: A4313A356403059BDB60DF99D8C4BAAB3A5EB64324F4441B5EC08A7756EB34FE41CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetActiveWindow.USER32(?,?,046C01D8,04657DC8), ref: 0465714E
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: ActiveWindow
                          • String ID:
                          • API String ID: 2558294473-0
                          • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction ID: b7eedc1b577979eea645408112cb289a44342e8e12ac68e57b9b8ade60315a7d
                          • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                          • Instruction Fuzzy Hash: 8E311C70600240ABEF54FE68D8C4B9A37966F54309F0844B5BD05DF2ABEA65FC86C764
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • EnumWindows.USER32(046561C0), ref: 046562B1
                          • GetWindow.USER32(00000003,00000003), ref: 046562C9
                          • GetWindowLongW.USER32(00000000,000000EC), ref: 046562D6
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 04656315
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Window$EnumLongWindows
                          • String ID:
                          • API String ID: 4191631535-0
                          • Opcode ID: 561f655003077fd9f474835d8f15b61dff889c6b54031db40e2a684fbda20b68
                          • Instruction ID: 775c4bfeb299054bb4f5c0520948cad5eb3ca13fa579ef6866f72d046d7f84ae
                          • Opcode Fuzzy Hash: 561f655003077fd9f474835d8f15b61dff889c6b54031db40e2a684fbda20b68
                          • Instruction Fuzzy Hash: 77117031604710AFEB20AA28CC84F997794DF45724F5581B8FD989F2E2D760A845CBA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetWindowThreadProcessId.USER32(00000000), ref: 04593E7D
                          • GetCurrentProcessId.KERNEL32(?,?,00000000,0465985D,?,?,?,00000001,04657A37), ref: 04593E86
                          • GlobalFindAtomW.KERNEL32(00000000), ref: 04593E9B
                          • GetPropW.USER32(00000000,00000000), ref: 04593EB2
                          Memory Dump Source
                          • Source File: 0000000E.00000002.2233331173.000000000447C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04460000, based on PE: true
                          • Associated: 0000000E.00000002.2233302549.0000000004460000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233331173.0000000004461000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233668888.00000000046B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233697650.00000000046B2000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233726272.00000000046B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233766772.00000000046B7000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233800295.00000000046B8000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233834084.00000000046BF000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233866460.00000000046C3000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233907592.00000000046C5000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 0000000E.00000002.2233961350.00000000046C8000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_14_2_4460000_rundll32.jbxd
                          Similarity
                          • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                          • String ID:
                          • API String ID: 2582817389-0
                          • Opcode ID: 8d2e57aea1f238bf17f644aef94eb2dc604d57818296a42328faf4fdf7621d66
                          • Instruction ID: 2cbf7154696529473978dc82abd88785105ccf2545037aa93b2c2083ea5ba3bb
                          • Opcode Fuzzy Hash: 8d2e57aea1f238bf17f644aef94eb2dc604d57818296a42328faf4fdf7621d66
                          • Instruction Fuzzy Hash: 6BF03771300523FBAF21B7F6AC8087F75CCEA081B93021826FD09C7152E619EC4696B5
                          Uniqueness

                          Uniqueness Score: -1.00%