Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
10kmr9d7.dll

Overview

General Information

Sample name:10kmr9d7.dll
renamed because original name is a hash value
Original sample name:10kmr9d7.mp3
Analysis ID:1490633
MD5:7abbf9f2106c2dd1e69110c6c6b8dbc6
SHA1:05cf0a54c0e62d170b6ff9bb0108b70164a0e681
SHA256:44f5ebb4facaba45274f08437a1f980bbbdb209cbd016ead76e4ec1afaca4dc2
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7328 cmdline: loaddll64.exe "C:\Users\user\Desktop\10kmr9d7.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7380 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7404 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7388 cmdline: rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CancelAllOperations MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7468 cmdline: rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Create MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7532 cmdline: rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Destroy MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7568 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_CancelAllOperations MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7576 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Create MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7588 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Destroy MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7604 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetTxtReplaceData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7616 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueReplaceData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7628 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueDeleteData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7636 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetBasicData MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7644 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_Delete MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7664 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ShutdownTargetDLL MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7704 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetMaxLogLevel MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7712 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetLogCallback MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7724 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActionsV2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7732 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActions MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7744 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessPendingActionsAfterReboot MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7768 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_PrepareUpdate MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7788 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_IsDLLNewlyLoaded MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7800 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_InitTargetDLL MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7816 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMinorAPIVersion MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7836 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMajorAPIVersion MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7844 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreatsV2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7868 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreats MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7876 cmdline: rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_FinishUpdate MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180015BF0 BCryptOpenAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,BCryptDestroyKey,BCryptCloseAlgorithmProvider,5_2_0000000180015BF0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180015700 Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,BCryptOpenAlgorithmProvider,BCryptGetProperty,BCryptGetProperty,BCryptCreateHash,BCryptHashData,BCryptFinishHash,BCryptCloseAlgorithmProvider,BCryptDestroyHash,5_2_0000000180015700
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180015F90 BCryptOpenAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,5_2_0000000180015F90
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: Binary string: D:\JENKINS\workspace\N_CleanActions\bin\x64\Release\ActionsShim.pdb source: rundll32.exe, 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.3566919339.0000000180154000.00000002.00000001.01000000.00000003.sdmp, 10kmr9d7.dll
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800143C0 GetLogicalDriveStringsW,QueryDosDeviceW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00000001800143C0

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 62.192.173.45 443Jump to behavior
Source: Joe Sandbox ViewASN Name: HUGESERVER-NETWORKSUS HUGESERVER-NETWORKSUS
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 733Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 733Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: global trafficHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 335Connection: Keep-AliveCache-Control: no-cache
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: weblineinfo.com
Source: unknownHTTP traffic detected: POST /flags/api/v2/frontend/experimentValues HTTP/1.1Accept: */*Content-Type: application/jsonX-Client-Name: feature-gate-js-clientX-Client-Version: 4.8.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36Host: weblineinfo.comContent-Length: 733Connection: Keep-AliveCache-Control: no-cache
Source: rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft.c
Source: rundll32.exe, 00000005.00000002.3567765146.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771469730.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230690493.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768162677.000001D5616C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254447572.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771548444.000001D5616C6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2048112069.00000251C5469000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C5463000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1835197651.00000251C546A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268841806.00000251C546E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/
Source: rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/D.
Source: rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/KC8
Source: rundll32.exe, 00000008.00000003.2843064279.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2843064279.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1835197651.00000251C546A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2694528807.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues
Source: rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1835197651.00000251C546A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues%
Source: rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues%J
Source: rundll32.exe, 00000008.00000003.1834996963.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues&&
Source: rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues&&B
Source: rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues(I
Source: rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C5463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues)
Source: rundll32.exe, 00000008.00000003.2268720540.00000251C549B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues)6
Source: rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues)Bg
Source: rundll32.exe, 00000008.00000003.1834996963.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues-
Source: rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues.com
Source: rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues.comy&qz
Source: rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues1&
Source: rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues7Bm
Source: rundll32.exe, 00000008.00000003.2694528807.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues8&
Source: rundll32.exe, 00000005.00000003.2016168138.000001D56172E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues;J
Source: rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValues?
Source: rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesA
Source: rundll32.exe, 00000005.00000003.1768051739.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768127854.000001D561704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesGz
Source: rundll32.exe, 00000005.00000003.2016168138.000001D56172E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesHJhz
Source: rundll32.exe, 00000008.00000002.3567840753.00000251C5463000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesIE5f
Source: rundll32.exe, 00000005.00000003.2016168138.000001D56172E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768051739.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768127854.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesOID
Source: rundll32.exe, 00000008.00000003.2268720540.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1834996963.00000251C54A3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2843064279.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2694528807.00000251C549B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C549B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesOIDInfo
Source: rundll32.exe, 00000008.00000003.1834996963.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesOIDr
Source: rundll32.exe, 00000005.00000003.1768051739.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768127854.000001D561704000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesSIs
Source: rundll32.exe, 00000008.00000003.1834996963.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesT
Source: rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2843064279.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesU&Uz
Source: rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuescom
Source: rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesdJLz0
Source: rundll32.exe, 00000008.00000003.2694528807.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesg&Gz
Source: rundll32.exe, 00000008.00000003.2694528807.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2843064279.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesll
Source: rundll32.exe, 00000008.00000003.2694528807.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesn&xz
Source: rundll32.exe, 00000005.00000003.1768051739.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768127854.000001D561704000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesoIW
Source: rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuessJSz/
Source: rundll32.exe, 00000008.00000003.2694528807.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1834996963.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2843064279.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weblineinfo.com/flags/api/v2/frontend/experimentValuesuxs
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 62.192.173.45:443 -> 192.168.2.4:49752 version: TLS 1.2
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180015BF0 BCryptOpenAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,BCryptDestroyKey,BCryptCloseAlgorithmProvider,5_2_0000000180015BF0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180015F90 BCryptOpenAlgorithmProvider,BCryptDestroyKey,BCryptCloseAlgorithmProvider,BCryptImportKeyPair,BCryptVerifySignature,BCryptDestroyKey,5_2_0000000180015F90
Source: C:\Windows\System32\rundll32.exeCode function: 5_3_000001D562FCD6CA NtProtectVirtualMemory,5_3_000001D562FCD6CA
Source: C:\Windows\System32\rundll32.exeCode function: 5_3_000001D562FCD65A NtAllocateVirtualMemory,5_3_000001D562FCD65A
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180006560 NtAllocateVirtualMemory,NtProtectVirtualMemory,5_2_0000000180006560
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000251C56CD65A NtAllocateVirtualMemory,8_3_00000251C56CD65A
Source: C:\Windows\System32\rundll32.exeCode function: 8_3_00000251C56CD6CA NtProtectVirtualMemory,8_3_00000251C56CD6CA
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018012A0005_2_000000018012A000
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180001D605_2_0000000180001D60
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018012C8045_2_000000018012C804
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001801178AC5_2_00000001801178AC
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800150D05_2_00000001800150D0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001801310C85_2_00000001801310C8
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180118A105_2_0000000180118A10
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001801172905_2_0000000180117290
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180117AB05_2_0000000180117AB0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018012D3185_2_000000018012D318
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180126B045_2_0000000180126B04
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018011A3C05_2_000000018011A3C0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800143C05_2_00000001800143C0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018012CC985_2_000000018012CC98
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_000000018000FE055_2_000000018000FE05
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001801236105_2_0000000180123610
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800065605_2_0000000180006560
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001801176A05_2_00000001801176A0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180139F045_2_0000000180139F04
Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180106AE4 appears 53 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180107230 appears 65 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018003C440 appears 47 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180005830 appears 51 times
Source: 10kmr9d7.dllBinary or memory string: OriginalFilenameActionsShim.dll8 vs 10kmr9d7.dll
Source: 10kmr9d7.dllStatic PE information: Section: .rsrc ZLIB complexity 0.9947324810606061
Source: 10kmr9d7.dllBinary string: ??\\?\\\.\LPTCOMCONPRNAUXNUL/ntdll.dllchineseczechnorwegianslovakidProcessUtilsD:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\ProcessUtils.cpp :\Device\Mup\\\Device\LanmanRedirector\\\\\.\GlobalrootOpenProcess call with pid [%d] failed with error [%d]. Cannot get the process path!mb::common::system::ProcessUtils::GetProcessPathGetProcessImageFileName for [%d] failed with error [%d]. Cannot get the process path!NtQuerySystemInformationSHA1MD5SHA256SHA384SHA512**** Error 0x%x returned by BCryptOpenAlgorithmProvider - HashMbCommonSigCRYPTUSRD:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cppMbHashMemoryObjectLength**** Error 0x%x returned by BCryptGetProperty getting object length**** memory allocation failedHashDigestLength**** Error 0x%x returned by BCryptGetProperty getting hash length**** Invalid hash size: %u, need %u**** Invalid hash buffer: %p**** Error 0x%x returned by BCryptCreateHash**** Error 0x%x returned by BCryptHashData**** Error 0x%x returned by BCryptFinishHashRSAPUBLICBLOBFailed to import the public key - %xImportRsaPublicKeyXRSA**** Error 0x%x returned by BCryptOpenAlgorithmProviderVerifyTrusted****> Failed to import public key - %xKaseya LimitedKaseya certificate is trusted!ConnectWise certificate is trusted!VerifyData**** Failed to import public key - %xVerify signature returns %xGetFileHash32Not A Valid Dos StubNot A Valid PE Executable**** Error getting memoryError calculating rest of data!!GetFileHash64
Source: classification engineClassification label: mal56.evad.winDLL@56/0@1/1
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008770 CreateToolhelp32Snapshot,GetLastError,Sleep,CreateToolhelp32Snapshot,Module32FirstW,CloseHandle,OpenProcess,GetLastError,GetLastError,GetModuleHandleW,GetProcAddress,GetModuleHandleW,LoadLibraryW,GetProcAddress,GetLastError,GetModuleHandleW,CloseHandle,VirtualQueryEx,CloseHandle,GetLastError,CloseHandle,CloseHandle,GetLastError,CloseHandle,5_2_0000000180008770
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03
Source: C:\Windows\System32\rundll32.exeMutant created: NULL
Source: 10kmr9d7.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CancelAllOperations
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\10kmr9d7.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CancelAllOperations
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Create
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Destroy
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_CancelAllOperations
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Create
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Destroy
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetTxtReplaceData
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueReplaceData
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueDeleteData
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetBasicData
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_Delete
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ShutdownTargetDLL
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetMaxLogLevel
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetLogCallback
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActionsV2
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActions
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessPendingActionsAfterReboot
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_PrepareUpdate
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_IsDLLNewlyLoaded
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_InitTargetDLL
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMinorAPIVersion
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMajorAPIVersion
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreatsV2
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreats
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_FinishUpdate
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CancelAllOperationsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CreateJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_DestroyJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_CancelAllOperationsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_CreateJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_DestroyJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetTxtReplaceDataJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueReplaceDataJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueDeleteDataJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetBasicDataJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_DeleteJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ShutdownTargetDLLJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetMaxLogLevelJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetLogCallbackJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActionsV2Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActionsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessPendingActionsAfterRebootJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_PrepareUpdateJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_IsDLLNewlyLoadedJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_InitTargetDLLJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMinorAPIVersionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMajorAPIVersionJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreatsV2Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreatsJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_FinishUpdateJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 10kmr9d7.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: 10kmr9d7.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: 10kmr9d7.dllStatic file information: File size 2449408 > 1048576
Source: 10kmr9d7.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x143800
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 10kmr9d7.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\JENKINS\workspace\N_CleanActions\bin\x64\Release\ActionsShim.pdb source: rundll32.exe, 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.3566919339.0000000180154000.00000002.00000001.01000000.00000003.sdmp, 10kmr9d7.dll
Source: 10kmr9d7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 10kmr9d7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 10kmr9d7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 10kmr9d7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 10kmr9d7.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008770 CreateToolhelp32Snapshot,GetLastError,Sleep,CreateToolhelp32Snapshot,Module32FirstW,CloseHandle,OpenProcess,GetLastError,GetLastError,GetModuleHandleW,GetProcAddress,GetModuleHandleW,LoadLibraryW,GetProcAddress,GetLastError,GetModuleHandleW,CloseHandle,VirtualQueryEx,CloseHandle,GetLastError,CloseHandle,CloseHandle,GetLastError,CloseHandle,5_2_0000000180008770
Source: 10kmr9d7.dllStatic PE information: real checksum: 0x227cd1 should be: 0x25c48f
Source: 10kmr9d7.dllStatic PE information: section name: _RDATA
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\rundll32.exeAPI coverage: 2.6 %
Source: C:\Windows\System32\loaddll64.exe TID: 7332Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_00000001800143C0 GetLogicalDriveStringsW,QueryDosDeviceW,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00000001800143C0
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 00000005.00000002.3567765146.000001D561668000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`Foa
Source: rundll32.exe, 00000006.00000002.1753744971.0000022AA39D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlloo@{P
Source: rundll32.exe, 0000000B.00000002.1792038899.00000295225E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000002.1791605637.0000026086208000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
Source: rundll32.exe, 0000000F.00000002.1787647780.000001B7BECD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR1sP
Source: rundll32.exe, 0000001A.00000002.1796375133.000001F677D98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllQQh
Source: rundll32.exe, 00000008.00000002.3567840753.00000251C5408000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
Source: rundll32.exe, 00000005.00000003.3230690493.000001D5616EF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567765146.000001D5616EF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254447572.000001D5616EE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771548444.000001D5616EF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768162677.000001D5616F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2048112069.00000251C5469000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C5463000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1835197651.00000251C546A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268841806.00000251C546E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000018.00000002.1796182452.000002E26C5E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRRp
Source: rundll32.exe, 0000000A.00000002.1795383594.000002359B098000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllOOIdP
Source: rundll32.exe, 0000001B.00000002.1795592817.00000235962C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRRr
Source: rundll32.exe, 00000010.00000002.1795949257.0000027E3E418000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR6
Source: rundll32.exe, 0000000E.00000002.1792035376.000001EFD54B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllTT<
Source: loaddll64.exe, 00000000.00000002.2992880785.0000021E94C2D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.1693344485.00000188A97F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.1787575832.000001EF1AAE8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000002.1791447808.00000192B5108000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000011.00000002.1795963479.000002A6721A8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000013.00000002.1795901134.00000162A0968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000014.00000002.1796234407.000001BAD9608000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000016.00000002.1796502483.0000015F23A48000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000017.00000002.1795112649.000001FFE41C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000019.00000002.1795768931.000001F96ABA8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000001C.00000002.1795491690.00000297BE728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: rundll32.exe, 00000004.00000002.1693602387.0000024133CF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllss
Source: rundll32.exe, 00000009.00000002.1788817676.0000025C64808000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllDD
Source: rundll32.exe, 00000012.00000002.1791652895.000001B025988000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllOO
Source: rundll32.exe, 00000015.00000002.1795224140.00000235868B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllTT
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180107848 GetLastError,IsDebuggerPresent,OutputDebugStringW,5_2_0000000180107848
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180107848 GetLastError,IsDebuggerPresent,OutputDebugStringW,5_2_0000000180107848
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180008770 CreateToolhelp32Snapshot,GetLastError,Sleep,CreateToolhelp32Snapshot,Module32FirstW,CloseHandle,OpenProcess,GetLastError,GetLastError,GetModuleHandleW,GetProcAddress,GetModuleHandleW,LoadLibraryW,GetProcAddress,GetLastError,GetModuleHandleW,CloseHandle,VirtualQueryEx,CloseHandle,GetLastError,CloseHandle,CloseHandle,GetLastError,CloseHandle,5_2_0000000180008770
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180115DC0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0000000180115DC0
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180106F64 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0000000180106F64

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 62.192.173.45 443Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7404Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7404Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7468Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7468Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: 7404 1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,5_2_0000000180130228
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,5_2_000000018012FDA8
Source: C:\Windows\System32\rundll32.exeCode function: 5_2_0000000180107684 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_0000000180107684
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
311
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
21
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
311
Process Injection
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1490633 Sample: 10kmr9d7.dll Startdate: 09/08/2024 Architecture: WINDOWS Score: 56 21 weblineinfo.com 2->21 7 loaddll64.exe 1 2->7         started        process3 process4 9 rundll32.exe 12 7->9         started        13 rundll32.exe 12 7->13         started        15 cmd.exe 1 7->15         started        17 24 other processes 7->17 dnsIp5 23 weblineinfo.com 62.192.173.45, 443, 49730, 49731 HUGESERVER-NETWORKSUS Lithuania 9->23 25 Sets debug register (to hijack the execution of another thread) 9->25 27 Modifies the context of a thread in another process (thread injection) 9->27 29 System process connects to network (likely due to code injection or exploit) 13->29 19 rundll32.exe 15->19         started        signatures6 process7

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://weblineinfo.com/0%Avira URL Cloudsafe
https://weblineinfo.com/D.0%Avira URL Cloudsafe
http://crl.microsoft.c0%Avira URL Cloudsafe
https://weblineinfo.com/KC80%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
weblineinfo.com
62.192.173.45
truetrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.microsoft.crundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2046428804.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://weblineinfo.com/KC8rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://weblineinfo.com/rundll32.exe, 00000005.00000002.3567765146.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771469730.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230690493.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771390805.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3419555198.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3230405674.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254376394.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3567979777.000001D5616FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.1768162677.000001D5616C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2254447572.000001D5616C4000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2771548444.000001D5616C6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2048112069.00000251C5469000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000002.3567840753.00000251C5463000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1835197651.00000251C546A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2463373720.00000251C54CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.2268841806.00000251C546E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://weblineinfo.com/D.rundll32.exe, 00000008.00000003.2268720540.00000251C54CD000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    62.192.173.45
    weblineinfo.comLithuania
    25780HUGESERVER-NETWORKSUStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1490633
    Start date and time:2024-08-09 16:23:04 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 7s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:34
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:10kmr9d7.dll
    renamed because original name is a hash value
    Original Sample Name:10kmr9d7.mp3
    Detection:MAL
    Classification:mal56.evad.winDLL@56/0@1/1
    EGA Information:
    • Successful, ratio: 50%
    HCA Information:
    • Successful, ratio: 72%
    • Number of executed functions: 13
    • Number of non-executed functions: 66
    Cookbook Comments:
    • Found application associated with file extension: .dll
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target rundll32.exe, PID 7576 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    HUGESERVER-NETWORKSUSmirai.spc.elfGet hashmaliciousMiraiBrowse
    • 171.22.79.159
    ClientAny.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
    • 2.58.84.229
    https://denizfirsatgsmtektikbuo.xyz/Get hashmaliciousHTMLPhisherBrowse
    • 2.58.85.5
    x86.elfGet hashmaliciousMirai, MoobotBrowse
    • 107.161.53.91
    lKXAJFq3ih.exeGet hashmaliciousAsyncRATBrowse
    • 2.58.85.145
    peign94sXb.elfGet hashmaliciousUnknownBrowse
    • 171.22.79.111
    jSlv5GLHad.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
    • 185.133.35.50
    hajime-like-20231028-0250.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 62.192.173.7
    HDyd3HGFG9.elfGet hashmaliciousMiraiBrowse
    • 62.192.173.7
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    37f463bf4616ecd445d4a1937da06e19PDFixers (1).exeGet hashmaliciousUnknownBrowse
    • 62.192.173.45
    file.exeGet hashmaliciousVidarBrowse
    • 62.192.173.45
    file.exeGet hashmaliciousBabuk, DjvuBrowse
    • 62.192.173.45
    file.exeGet hashmaliciousVidarBrowse
    • 62.192.173.45
    file.exeGet hashmaliciousVidarBrowse
    • 62.192.173.45
    Ordine 403012.docx.docGet hashmaliciousUnknownBrowse
    • 62.192.173.45
    SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
    • 62.192.173.45
    SecuriteInfo.com.Trojan.Crypt.23519.13317.exeGet hashmaliciousUnknownBrowse
    • 62.192.173.45
    verify-captcha-987.b-cdn.net.ps1Get hashmaliciousClipboard HijackerBrowse
    • 62.192.173.45
    No context
    No created / dropped files found
    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Entropy (8bit):6.748659647863066
    TrID:
    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
    • Win64 Executable (generic) (12005/4) 10.17%
    • Generic Win/DOS Executable (2004/3) 1.70%
    • DOS Executable Generic (2002/1) 1.70%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
    File name:10kmr9d7.dll
    File size:2'449'408 bytes
    MD5:7abbf9f2106c2dd1e69110c6c6b8dbc6
    SHA1:05cf0a54c0e62d170b6ff9bb0108b70164a0e681
    SHA256:44f5ebb4facaba45274f08437a1f980bbbdb209cbd016ead76e4ec1afaca4dc2
    SHA512:b577338b86d082f4f87e58342c54d5c2c80e17aa9bc983e558904aaaf8a23a6c780c5627e935c39bcabe63e3776310529f3066b06776a0f7869eff721a8bd3fd
    SSDEEP:49152:tR3rKKPT0xXxBg7KNvBtFXTM6utS1vdPUGu5hOAxNMQwR:fLeFDMb8F2Gu/fzwR
    TLSH:79B5AE17E3DA41F9DDB7C2388953C51BD7B2B8191370ABCF06A452681EA37E1127EB18
    File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$............~...~...~.......~......z~...~...~.......~.......~.......~.......~.......|.......~...~..3........~.......~.......~....M..~.
    Icon Hash:7ae282899bbab082
    Entrypoint:0x180106e54
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x180000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DLL
    DLL Characteristics:HIGH_ENTROPY_VA
    Time Stamp:0x662BC869 [Fri Apr 26 15:29:45 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:7654de49588e8164879719d356bd8735
    Instruction
    dec eax
    mov dword ptr [esp+08h], ebx
    dec eax
    mov dword ptr [esp+10h], esi
    push edi
    dec eax
    sub esp, 20h
    dec ecx
    mov edi, eax
    mov ebx, edx
    dec eax
    mov esi, ecx
    cmp edx, 01h
    jne 00007FF160D2FF27h
    call 00007FF160D30734h
    dec esp
    mov eax, edi
    mov edx, ebx
    dec eax
    mov ecx, esi
    dec eax
    mov ebx, dword ptr [esp+30h]
    dec eax
    mov esi, dword ptr [esp+38h]
    dec eax
    add esp, 20h
    pop edi
    jmp 00007FF160D2FDB4h
    int3
    int3
    int3
    dec eax
    mov eax, esp
    dec esp
    mov dword ptr [eax+20h], ecx
    dec esp
    mov dword ptr [eax+18h], eax
    dec eax
    mov dword ptr [eax+10h], edx
    push ebx
    push esi
    push edi
    inc ecx
    push esi
    dec eax
    sub esp, 38h
    dec ebp
    mov esi, ecx
    dec ecx
    mov ebx, eax
    dec eax
    mov esi, edx
    mov byte ptr [eax-38h], 00000000h
    dec eax
    mov edi, edx
    dec ecx
    imul edi, eax
    dec eax
    add edi, ecx
    dec eax
    mov dword ptr [eax+08h], edi
    dec eax
    mov eax, ebx
    dec eax
    dec ebx
    dec eax
    mov dword ptr [esp+70h], ebx
    dec eax
    test eax, eax
    je 00007FF160D2FF3Bh
    dec eax
    sub edi, esi
    dec eax
    mov dword ptr [esp+60h], edi
    dec eax
    mov ecx, edi
    dec ecx
    mov eax, esi
    dec eax
    mov edx, dword ptr [0003E71Ch]
    call edx
    jmp 00007FF160D2FEF9h
    mov byte ptr [esp+20h], 00000001h
    dec eax
    add esp, 38h
    inc ecx
    pop esi
    pop edi
    pop esi
    pop ebx
    ret
    int3
    dec eax
    mov dword ptr [esp+10h], ebx
    dec eax
    mov dword ptr [esp+18h], esi
    dec eax
    mov dword ptr [esp+08h], ecx
    push edi
    inc ecx
    push esi
    inc ecx
    push edi
    dec eax
    sub esp, 50h
    dec ebp
    mov esi, ecx
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x1fca900x3bc.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1fce4c0xc8.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x21b0000x3dc80.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2090000x10650.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2590000x5a28.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1e83e00x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x1e86000x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1e82a00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1450000x5f8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x14379c0x1438003d0b6dc5a907120acd2a7b48d00b2e83False0.4948032385046368data6.492820105687993IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1450000xb92fc0xb9400bb96591fd85a5ed81095b5e982a81a6bFalse0.3853955802968961data5.754560167815736IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x1ff0000x9ed40x4c00e5e06104c62e8c75c19b858e3ee1cbebFalse0.21145148026315788data3.619053235111025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x2090000x106500x10800d56b95ed2378ce9c949567aa2dc594c0False0.4711322206439394data6.104938474417208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    _RDATA0x21a0000x1f40x20065c1f4817abba73158ce681a35785c62False0.5078125data4.176173183361914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x21b0000x3dc800x3de00c84d88d4f874815287125f69ada14e47False0.9947324810606061data7.998012535592944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x2590000x5a280x5c0002ba99b3c0d3324a1bdaf65569abc896False0.2720788043478261data5.4317179166648275IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x21b0e80x2ccdataEnglishUnited States0.4790502793296089
    RT_ANICURSOR0x21b3b40x3d74adata0.9982480673123525
    RT_MANIFEST0x258b000x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    CRYPT32.dllCertDuplicateCertificateContext, CertFindCertificateInStore, CertFreeCertificateContext, CertOpenStore, CertCloseStore, CertGetCertificateContextProperty, CertEnumCertificatesInStore
    KERNEL32.dllGetFileAttributesW, SetLastError, GetCurrentThreadId, SetEndOfFile, GetStdHandle, FindNextFileW, FindClose, GetModuleHandleA, GetCurrentDirectoryW, SetEvent, ResetEvent, ReleaseMutex, CreateMutexW, CreateEventW, WaitForMultipleObjects, InitializeCriticalSectionAndSpinCount, TerminateProcess, GetStartupInfoW, GetSystemTimeAsFileTime, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetEnvironmentVariableW, SetEnvironmentVariableW, GetFileType, DeleteFiber, QueryPerformanceCounter, ConvertFiberToThread, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, WriteConsoleW, HeapSize, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetTimeZoneInformation, SystemTimeToTzSpecificLocalTime, GetLocalTime, GetTickCount, GetFileSize, HeapAlloc, GetProcessHeap, WaitForSingleObject, QueryDosDeviceW, GetLogicalDriveStringsW, FindFirstFileW, HeapFree, GetFileInformationByHandle, WriteFile, ReadFile, GetFileSizeEx, FlushFileBuffers, CreateFileW, GetWindowsDirectoryW, GetCurrentProcess, GetModuleFileNameW, FileTimeToSystemTime, MultiByteToWideChar, WideCharToMultiByte, LocalFree, FormatMessageW, DeleteCriticalSection, DecodePointer, InitializeCriticalSectionEx, VirtualQueryEx, GetModuleHandleW, Module32FirstW, CreateToolhelp32Snapshot, OpenProcess, GetCurrentProcessId, GetLastError, CloseHandle, GetProcAddress, FreeLibrary, LoadLibraryW, GetACP, IsValidCodePage, FindFirstFileExW, GetFullPathNameW, HeapReAlloc, SetStdHandle, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, SetFilePointerEx, GetConsoleOutputCP, PeekNamedPipe, GetDriveTypeW, SetConsoleCtrlHandler, ExitProcess, GetModuleHandleExW, EnterCriticalSection, LoadLibraryExW, RtlPcToFileHeader, InterlockedFlushSList, InterlockedPushEntrySList, RtlUnwindEx, RaiseException, OutputDebugStringW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetCPInfo, LCMapStringEx, EncodePointer, GetStringTypeW, Sleep, SwitchToThread, LeaveCriticalSection
    USER32.dllGetProcessWindowStation, MessageBoxW, GetUserObjectInformationW
    ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey, RegEnumKeyExW, CryptAcquireContextW, CryptCreateHash, CryptReleaseContext, CryptDestroyHash, CryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, ReportEventW, RegisterEventSourceW, DeregisterEventSource
    OLEAUT32.dllVariantClear
    PSAPI.DLLGetProcessImageFileNameW
    bcrypt.dllBCryptImportKeyPair, BCryptHashData, BCryptDestroyHash, BCryptGenRandom, BCryptCreateHash, BCryptCloseAlgorithmProvider, BCryptFinishHash, BCryptOpenAlgorithmProvider, BCryptVerifySignature, BCryptGetProperty, BCryptDestroyKey
    VERSION.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
    WS2_32.dllrecv, WSAGetLastError, WSAStartup, WSACleanup, send, closesocket, WSASetLastError
    NameOrdinalAddress
    ActionsShim_CancelAllOperations10x180007790
    ActionsShim_Create20x180006560
    ActionsShim_Destroy30x180006650
    ActionsShim_FinishUpdate40x180006b70
    ActionsShim_GetDetectedThreats50x180006d40
    ActionsShim_GetDetectedThreatsV260x180006e40
    ActionsShim_GetMajorAPIVersion70x180006540
    ActionsShim_GetMinorAPIVersion80x180006540
    ActionsShim_InitTargetDLL90x180006820
    ActionsShim_IsDLLNewlyLoaded100x180006550
    ActionsShim_PrepareUpdate110x180006a50
    ActionsShim_ProcessPendingActionsAfterReboot120x180007690
    ActionsShim_ProcessThreatActions130x180007490
    ActionsShim_ProcessThreatActionsV2140x180007590
    ActionsShim_SetLogCallback150x1800066b0
    ActionsShim_SetMaxLogLevel160x180006710
    ActionsShim_ShutdownTargetDLL170x180006950
    ActionsShim_Threat_Delete180x1800073a0
    ActionsShim_Threat_GetBasicData190x180006f40
    ActionsShim_Threat_GetRegValueDeleteData200x180007090
    ActionsShim_Threat_GetRegValueReplaceData210x180007190
    ActionsShim_Threat_GetTxtReplaceData220x1800072a0
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Aug 9, 2024 16:24:03.922116041 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:03.922202110 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:03.922326088 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:03.936258078 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:03.936292887 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.492029905 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.492139101 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.543076038 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.543144941 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.544083118 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.544154882 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.546281099 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.546282053 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.546320915 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.797925949 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.798125029 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.798135996 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.798194885 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.798384905 CEST49730443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.798425913 CEST4434973062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.815084934 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.815161943 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:04.815258980 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.815716028 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:04.815749884 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.337445021 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.341603994 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.371284962 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.371304035 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.372461081 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.372473955 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.770363092 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.770514965 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:05.770699978 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.770700932 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.771100044 CEST49731443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:05.771126032 CEST4434973162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:10.805861950 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:10.805918932 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:10.806039095 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:10.813563108 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:10.813601971 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.326992035 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.327126980 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.394947052 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.394993067 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.395838022 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.395895958 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.397484064 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.397506952 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.397520065 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.655251026 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.655369043 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.655389071 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.655462980 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.655644894 CEST49732443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.655668974 CEST4434973262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.677625895 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.677711964 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:11.677814007 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.678021908 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:11.678046942 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.212924004 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.213047028 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.213556051 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.213586092 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.214766979 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.214778900 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.465231895 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.465332031 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.465364933 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.465388060 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:12.465415001 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.465439081 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.465501070 CEST49733443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:12.465517998 CEST4434973362.192.173.45192.168.2.4
    Aug 9, 2024 16:24:29.825124979 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:29.825231075 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:29.825325966 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:29.825740099 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:29.825778008 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.335266113 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.335381031 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.335932970 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.335959911 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.347806931 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.347867012 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.580506086 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.580599070 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:30.580596924 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.580660105 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.580837011 CEST49740443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:30.580876112 CEST4434974062.192.173.45192.168.2.4
    Aug 9, 2024 16:24:32.530944109 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:32.531042099 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:32.531163931 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:32.531512022 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:32.531549931 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.351177931 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.351392984 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.351919889 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.351947069 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.363816977 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.363831043 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.601562023 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.601659060 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:33.601722956 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.601722956 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.604288101 CEST49741443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:33.604336023 CEST4434974162.192.173.45192.168.2.4
    Aug 9, 2024 16:24:53.629453897 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:53.629539013 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:53.629630089 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:53.629930973 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:53.629966021 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.160311937 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.160386086 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.161169052 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.161187887 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.173180103 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.173193932 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.403084040 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.403155088 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.403177977 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.403224945 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.403264046 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.403315067 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.403398991 CEST49742443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.403415918 CEST4434974262.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.930675030 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.930718899 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:54.930789948 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.931139946 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:54.931160927 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.592783928 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.592901945 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.593482018 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.593509912 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.595280886 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.595293999 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.837378025 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.837457895 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.837474108 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.837521076 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.837544918 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:24:55.837603092 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.837891102 CEST49744443192.168.2.462.192.173.45
    Aug 9, 2024 16:24:55.837903023 CEST4434974462.192.173.45192.168.2.4
    Aug 9, 2024 16:25:12.449069023 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:12.449150085 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:12.449263096 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:12.449783087 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:12.449821949 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.019397974 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.019491911 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.020029068 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.020046949 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.022020102 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.022032976 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.268074989 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.268156052 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.268276930 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.268277884 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.268512011 CEST49745443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.268549919 CEST4434974562.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.886428118 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.886492014 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:13.886593103 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.887018919 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:13.887041092 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.029779911 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.029944897 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.031110048 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.031141996 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.035043955 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.035058975 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.301609039 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.301764011 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.301774025 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:15.301866055 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.302308083 CEST49746443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:15.302328110 CEST4434974662.192.173.45192.168.2.4
    Aug 9, 2024 16:25:37.404977083 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.405069113 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:37.405167103 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.405414104 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.405455112 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:37.914118052 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:37.914258957 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.914726019 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.914753914 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:37.916152954 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:37.916167021 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:38.417464018 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:38.417629004 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:38.417722940 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:38.417722940 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:38.418076992 CEST49747443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:38.418119907 CEST4434974762.192.173.45192.168.2.4
    Aug 9, 2024 16:25:45.323740959 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.323829889 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:45.324157000 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.324534893 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.324588060 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:45.866206884 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:45.866307020 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.866861105 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.866883039 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:45.868627071 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:45.868642092 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:46.104569912 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:46.104641914 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:46.104783058 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:46.104783058 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:46.105034113 CEST49748443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:46.105055094 CEST4434974862.192.173.45192.168.2.4
    Aug 9, 2024 16:25:52.483527899 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:52.483572960 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:52.483674049 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:52.484015942 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:52.484036922 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.028017998 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.028112888 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.030002117 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.030019999 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.032059908 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.032071114 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.271513939 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.271611929 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:25:53.271658897 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.271686077 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.271929026 CEST49749443192.168.2.462.192.173.45
    Aug 9, 2024 16:25:53.271949053 CEST4434974962.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.172034025 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.172113895 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.172202110 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.172832012 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.172869921 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.357520103 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.357574940 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.357649088 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.357889891 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.357917070 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.711682081 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.712057114 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.742474079 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.742527008 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.743863106 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.743916988 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.987991095 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.988339901 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.989135981 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.989166975 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:08.993000984 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:08.993055105 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.019243956 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.019447088 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.019769907 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:09.019857883 CEST49750443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:09.019897938 CEST4434975062.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.438656092 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.438741922 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:09.438807964 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.438904047 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:09.438968897 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:09.439054966 CEST4434975162.192.173.45192.168.2.4
    Aug 9, 2024 16:26:09.439121008 CEST49751443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:27.488775969 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:27.488862038 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:27.489034891 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:27.489391088 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:27.489428997 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.018111944 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.018223047 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.022644043 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.022667885 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.023113012 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.023191929 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.023705006 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.068506002 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.263897896 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.263998032 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:28.264074087 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.264075041 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.264249086 CEST49752443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:28.264275074 CEST4434975262.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.068523884 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.068552017 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.068710089 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.069464922 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.069483042 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.631675959 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.631777048 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.742119074 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.742126942 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.743350983 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.743355989 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.989223957 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.989289045 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.989299059 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.989314079 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:31.989350080 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.989370108 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.999552965 CEST49753443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:31.999566078 CEST4434975362.192.173.45192.168.2.4
    Aug 9, 2024 16:26:46.341609001 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.341648102 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:46.341723919 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.341932058 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.341944933 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:46.863352060 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:46.863437891 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.864414930 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.864427090 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:46.865609884 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:46.865616083 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:47.116389990 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:47.116573095 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:47.116586924 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:47.116609097 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:47.116698980 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:47.116714001 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:47.117038965 CEST49754443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:47.117053032 CEST4434975462.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.118880987 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.118976116 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.119088888 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.119316101 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.119357109 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.639082909 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.639375925 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.640700102 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.640710115 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.644547939 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.644556046 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.886969090 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.887140036 CEST4434975562.192.173.45192.168.2.4
    Aug 9, 2024 16:26:50.887303114 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.887304068 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.921688080 CEST49755443192.168.2.462.192.173.45
    Aug 9, 2024 16:26:50.921755075 CEST4434975562.192.173.45192.168.2.4
    TimestampSource PortDest PortSource IPDest IP
    Aug 9, 2024 16:24:03.902522087 CEST5397353192.168.2.41.1.1.1
    Aug 9, 2024 16:24:03.916788101 CEST53539731.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Aug 9, 2024 16:24:03.902522087 CEST192.168.2.41.1.1.10xbadaStandard query (0)weblineinfo.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Aug 9, 2024 16:24:03.916788101 CEST1.1.1.1192.168.2.40xbadaNo error (0)weblineinfo.com62.192.173.45A (IP address)IN (0x0001)false
    • weblineinfo.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.44973062.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:04 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 733
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:04 UTC733OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 61 32 38 63 32 33 39 32 66 61 35 65 35 65 39 66 35 61 30 31 38 36 36 65 31 64 65 36 32 38 66 34 36 37 62 35 39 38 33 31 63 32 30 62 36 61 30 37 31 32 65 39 37 31 64 63 32 37 63 31 64 31 62 61 62 62 66 64 66 34
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258fa28c2392fa5e5e9f5a01866e1de628f467b59831c20b6a0712e971dc27c1d1babbfdf4
    2024-08-09 14:24:04 UTC303INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 519
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:04 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:04 UTC519INData Raw: 7b 22 65 78 70 65 72 69 6d 65 6e 74 56 61 6c 75 65 73 22 3a 7b 22 66 65 61 74 75 72 65 5f 67 61 74 65 73 22 3a 7b 22 33 38 36 38 37 38 33 33 38 34 22 3a 7b 22 6e 61 6d 65 22 3a 22 37 34 39 32 37 37 35 32 33 33 39 32 22 2c 22 76 61 6c 75 65 22 3a 74 72 75 65 2c 22 72 75 6c 65 5f 69 64 22 3a 22 70 6d 4a 7a 68 7a 77 70 4b 4c 37 48 64 4c 52 6f 63 61 71 4d 77 55 3a 31 30 30 2e 30 30 3a 33 22 2c 22 73 65 63 6f 6e 64 61 72 79 5f 65 78 70 6f 73 75 72 65 73 22 3a 5b 5d 7d 7d 2c 22 64 79 6e 61 6d 69 63 5f 63 6f 6e 66 69 67 73 22 3a 7b 22 34 32 30 30 33 32 38 38 31 30 22 3a 7b 22 6e 61 6d 65 22 3a 22 34 32 30 30 33 32 38 38 31 30 22 2c 22 76 61 6c 75 65 22 3a 7b 7d 2c 22 72 75 6c 65 5f 69 64 22 3a 22 70 72 65 73 74 61 72 74 22 2c 22 73 65 63 6f 6e 64 61 72 79 5f 65
    Data Ascii: {"experimentValues":{"feature_gates":{"3868783384":{"name":"749277523392","value":true,"rule_id":"pmJzhzwpKL7HdLRocaqMwU:100.00:3","secondary_exposures":[]}},"dynamic_configs":{"4200328810":{"name":"4200328810","value":{},"rule_id":"prestart","secondary_e


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    1192.168.2.44973162.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:05 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:05 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:24:05 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:05 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:05 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    2192.168.2.44973262.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:11 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 733
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:11 UTC733OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 61 32 38 63 32 33 39 32 66 61 35 65 35 65 39 66 35 61 30 31 38 36 36 65 31 64 65 36 32 38 66 34 36 37 62 35 39 38 33 31 63 32 30 62 36 61 30 37 31 32 65 39 37 31 64 63 32 37 63 31 64 31 62 61 62 62 66 64 66 34
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258fa28c2392fa5e5e9f5a01866e1de628f467b59831c20b6a0712e971dc27c1d1babbfdf4
    2024-08-09 14:24:11 UTC303INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 519
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:11 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:11 UTC519INData Raw: 7b 22 65 78 70 65 72 69 6d 65 6e 74 56 61 6c 75 65 73 22 3a 7b 22 66 65 61 74 75 72 65 5f 67 61 74 65 73 22 3a 7b 22 33 38 36 38 37 38 33 33 38 34 22 3a 7b 22 6e 61 6d 65 22 3a 22 37 34 39 32 37 37 35 32 33 33 39 32 22 2c 22 76 61 6c 75 65 22 3a 74 72 75 65 2c 22 72 75 6c 65 5f 69 64 22 3a 22 70 6d 4a 7a 68 7a 77 70 4b 4c 37 48 64 4c 52 6f 63 61 71 4d 77 55 3a 31 30 30 2e 30 30 3a 33 22 2c 22 73 65 63 6f 6e 64 61 72 79 5f 65 78 70 6f 73 75 72 65 73 22 3a 5b 5d 7d 7d 2c 22 64 79 6e 61 6d 69 63 5f 63 6f 6e 66 69 67 73 22 3a 7b 22 34 32 30 30 33 32 38 38 31 30 22 3a 7b 22 6e 61 6d 65 22 3a 22 34 32 30 30 33 32 38 38 31 30 22 2c 22 76 61 6c 75 65 22 3a 7b 7d 2c 22 72 75 6c 65 5f 69 64 22 3a 22 70 72 65 73 74 61 72 74 22 2c 22 73 65 63 6f 6e 64 61 72 79 5f 65
    Data Ascii: {"experimentValues":{"feature_gates":{"3868783384":{"name":"749277523392","value":true,"rule_id":"pmJzhzwpKL7HdLRocaqMwU:100.00:3","secondary_exposures":[]}},"dynamic_configs":{"4200328810":{"name":"4200328810","value":{},"rule_id":"prestart","secondary_e


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    3192.168.2.44973362.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:12 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:12 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:24:12 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:12 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:12 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    4192.168.2.44974062.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:30 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:30 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:24:30 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:30 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:30 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    5192.168.2.44974162.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:33 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:33 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:24:33 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:33 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:33 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    6192.168.2.44974262.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:54 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:54 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:24:54 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:54 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:54 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    7192.168.2.44974462.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:24:55 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:24:55 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:24:55 UTC302INHTTP/1.1 200 OK
    Atl-Traceid: bd5dc8037c884e41b347a3eb314810ca
    Content-Length: 41
    Content-Type: application/json
    Date: Fri, 09 Aug 2024 14:24:55 GMT
    Nel: {"failure_fraction": 0.001, "include_subdomains": true, "max_age": 600, "report_to": "endpoint-1"}
    Server: AtlassianEdge
    Connection: close
    2024-08-09 14:24:55 UTC41INData Raw: 7b 22 73 75 63 63 65 73 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 22 3a 22 75 73 65 72 5f 6e 6f 74 5f 66 6f 75 6e 64 22 7d
    Data Ascii: {"succes":false,"error":"user_not_found"}


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    8192.168.2.44974562.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:25:13 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:25:13 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:25:13 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:25:13 GMT
    Connection: close
    2024-08-09 14:25:13 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    9192.168.2.44974662.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:25:15 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:25:15 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:25:15 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:25:15 GMT
    Connection: close
    2024-08-09 14:25:15 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    10192.168.2.44974762.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:25:37 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:25:37 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:25:38 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:25:38 GMT
    Connection: close
    2024-08-09 14:25:38 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    11192.168.2.44974862.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:25:45 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:25:45 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:25:46 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:25:45 GMT
    Connection: close
    2024-08-09 14:25:46 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    12192.168.2.44974962.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:25:53 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:25:53 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:25:53 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:25:53 GMT
    Connection: close
    2024-08-09 14:25:53 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    13192.168.2.44975062.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:08 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:08 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:26:09 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:08 GMT
    Connection: close
    2024-08-09 14:26:09 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    14192.168.2.44975162.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:08 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:08 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:26:09 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:09 GMT
    Connection: close
    2024-08-09 14:26:09 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    15192.168.2.44975262.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:28 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:28 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:26:28 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:28 GMT
    Connection: close
    2024-08-09 14:26:28 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    16192.168.2.44975362.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:31 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:31 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:26:31 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:31 GMT
    Connection: close
    2024-08-09 14:26:31 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    17192.168.2.44975462.192.173.454437576C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:46 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:46 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 36 39 32 34 32 37 31 62 64 33 31 33 34 39 36 30 34 32 35 39 33 32 66 39 32 31 31 62 66 39 61 32 32 65 34 33 35 35 65 36 66 35 64 39 34 30 32 66 36 30 35 65 31 66 35 61 39 62 35 62 35 39 35
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad77896924271bd3134960425932f9211bf9a22e4355e6f5d9402f605e1f5a9b5b595
    2024-08-09 14:26:47 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:47 GMT
    Connection: close
    2024-08-09 14:26:47 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    18192.168.2.44975562.192.173.454437468C:\Windows\System32\rundll32.exe
    TimestampBytes transferredDirectionData
    2024-08-09 14:26:50 UTC387OUTPOST /flags/api/v2/frontend/experimentValues HTTP/1.1
    Accept: */*
    Content-Type: application/json
    X-Client-Name: feature-gate-js-client
    X-Client-Version: 4.8.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36
    Host: weblineinfo.com
    Content-Length: 335
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-08-09 14:26:50 UTC335OUTData Raw: 7b 22 69 64 65 6e 74 69 66 69 65 72 73 22 3a 7b 22 74 72 65 6c 6c 6f 55 73 65 72 49 64 22 3a 22 30 36 65 66 31 39 64 35 37 63 22 2c 22 61 74 6c 61 73 73 69 61 6e 41 63 63 6f 75 6e 74 49 64 22 3a 22 35 32 33 32 33 31 3a 36 66 35 64 66 35 34 35 2d 64 35 34 64 2d 34 36 64 33 2d 38 65 31 34 2d 32 65 31 63 33 34 31 35 32 39 65 31 22 7d 2c 22 63 75 73 74 6f 6d 41 74 74 72 69 62 75 74 65 73 22 3a 7b 22 6c 6f 63 61 6c 65 22 3a 22 65 6e 22 2c 22 64 65 76 22 3a 22 31 31 64 35 34 35 61 37 65 30 39 66 34 37 35 37 63 63 65 32 31 62 62 66 35 39 63 36 32 35 38 66 38 61 64 37 37 38 39 35 39 32 34 32 37 63 64 61 32 63 35 30 65 36 36 63 32 32 39 61 34 63 38 37 31 64 63 31 65 64 35 36 65 33 34 34 35 66 36 62 33 61 38 64 36 32 38 32 31 66 66 37 66 37 61 61 62 34 64 30 38 37
    Data Ascii: {"identifiers":{"trelloUserId":"06ef19d57c","atlassianAccountId":"523231:6f5df545-d54d-46d3-8e14-2e1c341529e1"},"customAttributes":{"locale":"en","dev":"11d545a7e09f4757cce21bbf59c6258f8ad7789592427cda2c50e66c229a4c871dc1ed56e3445f6b3a8d62821ff7f7aab4d087
    2024-08-09 14:26:50 UTC136INHTTP/1.1 200 OK
    Content-Length: 14
    Content-Type: text/plain; charset=utf-8
    Date: Fri, 09 Aug 2024 14:26:50 GMT
    Connection: close
    2024-08-09 14:26:50 UTC14INData Raw: 50 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64
    Data Ascii: Page not found


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:10:23:57
    Start date:09/08/2024
    Path:C:\Windows\System32\loaddll64.exe
    Wow64 process (32bit):false
    Commandline:loaddll64.exe "C:\Users\user\Desktop\10kmr9d7.dll"
    Imagebase:0x7ff6ce1b0000
    File size:165'888 bytes
    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:10:23:57
    Start date:09/08/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:10:23:57
    Start date:09/08/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1
    Imagebase:0x7ff798fd0000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:10:23:57
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_CancelAllOperations
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:10:23:57
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",#1
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:10:24:00
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Create
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:6
    Start time:10:24:03
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe C:\Users\user\Desktop\10kmr9d7.dll,ActionsShim_Destroy
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_CancelAllOperations
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Create
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:false

    Target ID:9
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Destroy
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetTxtReplaceData
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueReplaceData
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:12
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetRegValueDeleteData
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:13
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_GetBasicData
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:14
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_Threat_Delete
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:10:24:06
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ShutdownTargetDLL
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:16
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetMaxLogLevel
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:17
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_SetLogCallback
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:18
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActionsV2
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:19
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessThreatActions
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_ProcessPendingActionsAfterReboot
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:21
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_PrepareUpdate
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_IsDLLNewlyLoaded
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_InitTargetDLL
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMinorAPIVersion
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetMajorAPIVersion
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreatsV2
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:27
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_GetDetectedThreats
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:28
    Start time:10:24:07
    Start date:09/08/2024
    Path:C:\Windows\System32\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\10kmr9d7.dll",ActionsShim_FinishUpdate
    Imagebase:0x7ff668170000
    File size:71'680 bytes
    MD5 hash:EF3179D498793BF4234F708D3BE28633
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:1.6%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:6.2%
      Total number of Nodes:948
      Total number of Limit Nodes:17
      execution_graph 15617 1800013f0 15622 180005830 15617->15622 15619 18000140d 15620 180106ae4 57 API calls 15619->15620 15621 180106b29 15620->15621 15624 1800058f3 15622->15624 15623 1800059fb ISource 15623->15619 15624->15623 15625 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 15624->15625 15626 180005a44 15625->15626 15635 180004e50 EnterCriticalSection 15626->15635 15628 180005a81 15629 180005c41 15628->15629 15630 180106664 std::_Facet_Register 5 API calls 15628->15630 15636 180004c60 LeaveCriticalSection 15629->15636 15631 180005a99 memcpy_s 15630->15631 15634 180005830 60 API calls 15631->15634 15633 180005c77 15633->15619 15634->15629 15635->15628 15636->15633 15652 180002bf0 15657 180022fa0 15652->15657 15655 180106ae4 57 API calls 15656 180106b29 15655->15656 15660 180022fc0 InitializeCriticalSectionAndSpinCount 15657->15660 15659 180002c00 15659->15655 15660->15659 15661 18000e7f5 15680 180105938 15661->15680 15663 18000e820 15664 180105938 std::_Lockit::_Lockit 6 API calls 15663->15664 15669 18000e86f Concurrency::cancel_current_task 15663->15669 15665 18000e845 15664->15665 15684 1801059b0 15665->15684 15666 1801059b0 std::_Lockit::~_Lockit LeaveCriticalSection 15668 18000e900 15666->15668 15670 180106610 Concurrency::cancel_current_task 8 API calls 15668->15670 15679 18000e8bc 15669->15679 15688 18000ec10 15669->15688 15671 18000e910 15670->15671 15674 18000e923 15733 180009930 15674->15733 15675 18000e8d4 15730 1801055e8 15675->15730 15679->15666 15681 180105947 15680->15681 15682 18010594c 15680->15682 15747 1801288bc 15681->15747 15682->15663 15685 1801059c4 15684->15685 15686 1801059bb LeaveCriticalSection 15684->15686 15685->15669 15689 18000ec4e 15688->15689 15729 18000ee8d 15688->15729 15691 180106664 std::_Facet_Register 5 API calls 15689->15691 15689->15729 15690 180106610 Concurrency::cancel_current_task 8 API calls 15692 18000e8ce 15690->15692 15693 18000ec60 15691->15693 15692->15674 15692->15675 15694 180105938 std::_Lockit::_Lockit 6 API calls 15693->15694 15696 18000eca0 15694->15696 15708 18000eebc 15696->15708 15780 18011d700 15696->15780 15702 180105ec0 55 API calls 15703 18000ed4e 15702->15703 15704 18000ed63 15703->15704 15705 18000eeb7 15703->15705 15794 18000f4c0 15704->15794 15707 180105240 Concurrency::cancel_current_task 2 API calls 15705->15707 15707->15708 15822 1801052c8 15708->15822 15709 18000ed7c 15710 18000f4c0 25 API calls 15709->15710 15711 18000ed92 15710->15711 15813 180105d24 15711->15813 15714 180105d24 13 API calls 15715 18000edf8 15714->15715 15716 18000ee1b 15715->15716 15717 18011bf80 __std_exception_copy 13 API calls 15715->15717 15718 18000ee2e 15716->15718 15719 18011bf80 __std_exception_copy 13 API calls 15716->15719 15717->15716 15720 18000ee42 15718->15720 15722 18011bf80 __std_exception_copy 13 API calls 15718->15722 15719->15718 15721 18000ee56 15720->15721 15723 18011bf80 __std_exception_copy 13 API calls 15720->15723 15724 18000ee6a 15721->15724 15725 18011bf80 __std_exception_copy 13 API calls 15721->15725 15722->15720 15723->15721 15726 18000ee7e 15724->15726 15727 18011bf80 __std_exception_copy 13 API calls 15724->15727 15725->15724 15728 1801059b0 std::_Lockit::~_Lockit LeaveCriticalSection 15726->15728 15727->15726 15728->15729 15729->15690 15731 180106664 std::_Facet_Register 5 API calls 15730->15731 15732 1801055fb 15731->15732 15732->15679 15734 18000993e Concurrency::cancel_current_task 15733->15734 15735 180108fa8 Concurrency::cancel_current_task 2 API calls 15734->15735 15736 18000994f 15735->15736 15737 180105938 std::_Lockit::_Lockit 6 API calls 15736->15737 15738 180009980 15737->15738 15739 180105938 std::_Lockit::_Lockit 6 API calls 15738->15739 15745 1800099cf Concurrency::cancel_current_task 15738->15745 15740 1800099a5 15739->15740 15743 1801059b0 std::_Lockit::~_Lockit LeaveCriticalSection 15740->15743 15741 1801059b0 std::_Lockit::~_Lockit LeaveCriticalSection 15742 180009a60 15741->15742 15744 180106610 Concurrency::cancel_current_task 8 API calls 15742->15744 15743->15745 15746 180009a70 15744->15746 15745->15741 15750 1801305f8 15747->15750 15771 18012fe24 15750->15771 15753 18012fe24 __crtLCMapStringW 5 API calls 15754 180130637 15753->15754 15755 18012fe24 __crtLCMapStringW 5 API calls 15754->15755 15756 180130656 15755->15756 15757 18012fe24 __crtLCMapStringW 5 API calls 15756->15757 15758 180130675 15757->15758 15759 18012fe24 __crtLCMapStringW 5 API calls 15758->15759 15760 180130694 15759->15760 15761 18012fe24 __crtLCMapStringW 5 API calls 15760->15761 15762 1801306b3 15761->15762 15763 18012fe24 __crtLCMapStringW 5 API calls 15762->15763 15764 1801306d2 15763->15764 15765 18012fe24 __crtLCMapStringW 5 API calls 15764->15765 15766 1801306f1 15765->15766 15767 18012fe24 __crtLCMapStringW 5 API calls 15766->15767 15768 180130710 15767->15768 15769 18012fe24 __crtLCMapStringW 5 API calls 15768->15769 15770 18013072f 15769->15770 15772 18012fe81 15771->15772 15773 18012fe7c __crtLCMapStringW 15771->15773 15772->15753 15773->15772 15774 18012feb1 LoadLibraryExW 15773->15774 15775 18012ffa6 GetProcAddress 15773->15775 15779 18012ff10 LoadLibraryExW 15773->15779 15776 18012ff86 15774->15776 15777 18012fed6 GetLastError 15774->15777 15775->15772 15776->15775 15778 18012ff9d FreeLibrary 15776->15778 15777->15773 15778->15775 15779->15773 15779->15776 15781 18012aab0 _Getctype 55 API calls 15780->15781 15782 18011d709 15781->15782 15827 18012c72c 15782->15827 15785 180105ec0 15844 180128918 15785->15844 15793 18000ed16 15793->15702 15796 18000f500 15794->15796 15795 18000f54b 15798 18000f563 15795->15798 15799 18000f5c8 15795->15799 15796->15795 15797 180105d24 13 API calls 15796->15797 15797->15796 15800 18000f59b 15798->15800 15802 180105d24 13 API calls 15798->15802 15801 180105240 Concurrency::cancel_current_task 2 API calls 15799->15801 15803 180106610 Concurrency::cancel_current_task 8 API calls 15800->15803 15805 18000f5cd 15801->15805 15802->15798 15804 18000f5af 15803->15804 15804->15709 15806 18000f614 ctype 15805->15806 15807 180105240 Concurrency::cancel_current_task 2 API calls 15805->15807 15806->15709 15808 18000f63f 15807->15808 15809 18000f668 15808->15809 15810 18011bf80 __std_exception_copy 13 API calls 15808->15810 15811 18011bf80 __std_exception_copy 13 API calls 15809->15811 15810->15809 15812 18000f671 ISource 15811->15812 15812->15709 15814 18000edc3 15813->15814 15816 180105d4a 15813->15816 15814->15714 15815 180105e6a MultiByteToWideChar 15815->15814 15821 180105d86 15815->15821 15816->15814 15816->15815 15817 180105d79 15816->15817 15818 180105e0c 15816->15818 15817->15815 15817->15821 15818->15814 15820 180105e41 MultiByteToWideChar 15818->15820 15819 180124bfc _Wcrtomb 11 API calls 15819->15814 15820->15814 15820->15821 15821->15814 15821->15819 15864 1801051f8 15822->15864 15825 180108fa8 Concurrency::cancel_current_task 2 API calls 15826 18000eec9 15825->15826 15828 18012c741 15827->15828 15829 18000ed0d 15827->15829 15828->15829 15831 180137810 15828->15831 15829->15785 15832 18012aab0 _Getctype 55 API calls 15831->15832 15833 18013781f 15832->15833 15834 18013786a 15833->15834 15843 18012884c EnterCriticalSection 15833->15843 15834->15829 15845 18012aab0 _Getctype 55 API calls 15844->15845 15846 180128921 15845->15846 15847 18012c72c _Getctype 55 API calls 15846->15847 15848 180105ee5 15847->15848 15849 18012897c 15848->15849 15850 18012aab0 _Getctype 55 API calls 15849->15850 15851 180128985 15850->15851 15852 18012c72c _Getctype 55 API calls 15851->15852 15853 180105eec 15852->15853 15854 180128948 15853->15854 15855 18012aab0 _Getctype 55 API calls 15854->15855 15856 180128951 15855->15856 15857 18012c72c _Getctype 55 API calls 15856->15857 15858 180105ef4 15857->15858 15858->15793 15859 1801288e8 15858->15859 15860 18012aab0 _Getctype 55 API calls 15859->15860 15861 1801288f1 15860->15861 15862 18012c72c _Getctype 55 API calls 15861->15862 15863 18012890a 15862->15863 15863->15793 15865 180108748 __std_exception_copy 57 API calls 15864->15865 15866 18010522c 15865->15866 15866->15825 14647 180001010 14648 180106b20 14647->14648 14651 180106ae4 14648->14651 14650 180106b29 14652 180106afe 14651->14652 14654 180106af7 14651->14654 14655 18012a34c 14652->14655 14654->14650 14658 180129f88 14655->14658 14665 18012884c EnterCriticalSection 14658->14665 14660 180129fa4 14661 18012a000 57 API calls 14660->14661 14662 180129fad 14661->14662 14663 1801288a0 _Getctype LeaveCriticalSection 14662->14663 14664 180129fb6 14663->14664 14664->14654 16038 180002c10 16041 180024420 16038->16041 16042 1800244a5 16041->16042 16056 180024450 16041->16056 16043 180106750 3 API calls 16042->16043 16045 1800244b1 16043->16045 16048 180022fa0 shared_ptr InitializeCriticalSectionAndSpinCount 16045->16048 16045->16056 16046 18002445d 16049 180106664 std::_Facet_Register 5 API calls 16046->16049 16052 180024472 16046->16052 16051 1800244c2 16048->16051 16049->16052 16050 180002c19 16059 180106b20 16051->16059 16058 18001efd0 LeaveCriticalSection 16052->16058 16057 180004e50 EnterCriticalSection 16056->16057 16057->16046 16058->16050 16060 180106ae4 57 API calls 16059->16060 16061 1800244ce 16060->16061 16062 1801066e4 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 16061->16062 16078 180001020 16079 180106b20 16078->16079 16080 180106ae4 57 API calls 16079->16080 16081 180106b29 16080->16081 16329 180001030 16330 180005830 60 API calls 16329->16330 16331 18000104d 16330->16331 16332 180106ae4 57 API calls 16331->16332 16333 180106b29 16332->16333 18698 180001a30 18699 180106664 std::_Facet_Register 5 API calls 18698->18699 18700 180001a66 ctype 18699->18700 18701 180106ae4 57 API calls 18700->18701 18702 180106b29 18701->18702 19241 180002700 19246 180023e30 19241->19246 19243 180002717 19244 180106ae4 57 API calls 19243->19244 19245 180106b29 19244->19245 19247 180023e42 19246->19247 19252 180023eca 19246->19252 19250 180023eb7 ISource 19247->19250 19251 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 19247->19251 19250->19243 19251->19252 19253 180022880 19252->19253 19254 1800228ac 19253->19254 19265 180005370 19254->19265 19256 1800228d7 19257 180005370 59 API calls 19256->19257 19258 1800228e2 19257->19258 19280 180022940 19258->19280 19266 180005383 19265->19266 19267 1800053a7 ISource 19265->19267 19266->19267 19268 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 19266->19268 19267->19256 19269 1800053cd 19268->19269 19270 18000542d 19269->19270 19271 18000547d 19269->19271 19276 180005404 ctype 19269->19276 19272 180106664 std::_Facet_Register 5 API calls 19270->19272 19273 1800054c0 Concurrency::cancel_current_task 19270->19273 19274 180106664 std::_Facet_Register 5 API calls 19271->19274 19277 180005448 ctype 19271->19277 19275 180005443 19272->19275 19273->19276 19274->19277 19275->19277 19278 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 19275->19278 19276->19256 19277->19256 19279 1800054bf 19278->19279 19279->19273 19306 180013d30 19280->19306 19307 180013d51 19306->19307 19327 180009370 19307->19327 19328 180106664 std::_Facet_Register 5 API calls 19327->19328 19329 1800093cb 19328->19329 19330 180105628 69 API calls 19329->19330 19331 1800093db 19330->19331 19376 180001720 19377 180022fa0 shared_ptr InitializeCriticalSectionAndSpinCount 19376->19377 19378 180001730 19377->19378 19379 180106ae4 57 API calls 19378->19379 19380 180106b29 19379->19380 19484 180002750 19485 180023e30 72 API calls 19484->19485 19486 180002767 19485->19486 19487 180106ae4 57 API calls 19486->19487 19488 180106b29 19487->19488 14666 180001d60 14718 180008370 14666->14718 14669 180008370 59 API calls 14670 180001e1a 14669->14670 14671 180008370 59 API calls 14670->14671 14672 180001e8a ctype 14671->14672 14673 180008370 59 API calls 14672->14673 14674 180001f02 ctype 14673->14674 14675 180008370 59 API calls 14674->14675 14676 180001f79 14675->14676 14677 180008370 59 API calls 14676->14677 14678 180001fe5 14677->14678 14679 180008370 59 API calls 14678->14679 14680 18000204b 14679->14680 14681 180008370 59 API calls 14680->14681 14682 1800020b7 14681->14682 14683 180008370 59 API calls 14682->14683 14684 180002127 ctype 14683->14684 14685 180008370 59 API calls 14684->14685 14686 18000220f ctype 14685->14686 14729 180106664 14686->14729 14688 180002666 14751 18001f070 14688->14751 14689 180106664 std::_Facet_Register 5 API calls 14691 180002272 14689->14691 14691->14688 14691->14689 14699 180002368 ISource 14691->14699 14743 180008d20 14691->14743 14692 18000266c 14694 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14692->14694 14695 180002672 14694->14695 14697 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14695->14697 14696 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14696->14688 14698 180002678 14697->14698 14701 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14698->14701 14699->14692 14699->14695 14699->14698 14700 18000267e 14699->14700 14703 180002684 14699->14703 14706 180002690 14699->14706 14707 18000268a 14699->14707 14709 18000262f ISource 14699->14709 14710 180002696 14699->14710 14714 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14699->14714 14717 180002660 14699->14717 14702 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14700->14702 14701->14700 14702->14703 14704 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14703->14704 14704->14707 14705 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14705->14706 14708 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14706->14708 14707->14705 14708->14710 14712 180106ae4 57 API calls 14709->14712 14738 1801160ac 14710->14738 14715 180106b29 14712->14715 14713 18000269c 14716 18001fe80 64 API calls 14713->14716 14714->14717 14716->14709 14717->14696 14719 180008389 14718->14719 14720 1800083ad 14718->14720 14721 180008392 14719->14721 14722 1800083d7 Concurrency::cancel_current_task 14719->14722 14723 180001dac 14720->14723 14726 180106664 std::_Facet_Register 5 API calls 14720->14726 14725 180106664 std::_Facet_Register 5 API calls 14721->14725 14724 180008397 14722->14724 14723->14669 14724->14723 14727 1801160ac _invalid_parameter_noinfo_noreturn 55 API calls 14724->14727 14725->14724 14726->14723 14728 1800083e2 14727->14728 14730 18010666f 14729->14730 14731 180106688 14730->14731 14732 1801293dc std::_Facet_Register 2 API calls 14730->14732 14733 18010668e 14730->14733 14731->14691 14732->14730 14734 18010669a Concurrency::cancel_current_task 14733->14734 14754 180105240 14733->14754 14736 1801066a0 14734->14736 14736->14736 14763 180115f24 14738->14763 14744 180008d46 14743->14744 14750 180008d5f ctype 14743->14750 14745 180008d92 14744->14745 14746 180008d55 14744->14746 14957 1800083f0 14745->14957 14748 180008370 59 API calls 14746->14748 14748->14750 14750->14691 14752 180105280 59 API calls 14751->14752 14753 18001f080 14752->14753 14753->14692 14755 18010524e std::bad_alloc::bad_alloc 14754->14755 14758 180108fa8 14755->14758 14757 18010525f 14759 180108fc7 14758->14759 14760 180109012 RaiseException 14759->14760 14761 180108ff0 RtlPcToFileHeader 14759->14761 14760->14757 14762 180109008 14761->14762 14762->14760 14764 180115f4f 14763->14764 14775 180115fc0 14764->14775 14766 180115f99 14769 180115fae 14766->14769 14770 180115ca0 _invalid_parameter_noinfo 55 API calls 14766->14770 14767 180115f76 14767->14766 14785 180115ca0 14767->14785 14771 1801160dc IsProcessorFeaturePresent 14769->14771 14770->14769 14772 1801160ef 14771->14772 14773 180115dc0 _invalid_parameter_noinfo_noreturn 14 API calls 14772->14773 14774 18011610a GetCurrentProcess TerminateProcess 14773->14774 14794 180115d08 14775->14794 14779 180115ffb 14779->14767 14781 1801160dc _invalid_parameter_noinfo_noreturn 17 API calls 14782 18011608b 14781->14782 14783 180115f24 _invalid_parameter_noinfo 55 API calls 14782->14783 14784 1801160a5 14783->14784 14784->14767 14786 180115cf3 14785->14786 14787 180115cb3 GetLastError 14785->14787 14786->14766 14788 180115cc3 14787->14788 14789 18012acf0 _invalid_parameter_noinfo 16 API calls 14788->14789 14790 180115cde SetLastError 14789->14790 14790->14786 14791 180115d01 14790->14791 14820 180125800 14791->14820 14795 180115d24 GetLastError 14794->14795 14796 180115d5f 14794->14796 14797 180115d34 14795->14797 14796->14779 14800 180115d74 14796->14800 14803 18012acf0 14797->14803 14801 180115da8 14800->14801 14802 180115d90 GetLastError SetLastError 14800->14802 14801->14779 14801->14781 14802->14801 14804 18012ad2a FlsSetValue 14803->14804 14805 18012ad0f FlsGetValue 14803->14805 14806 18012ad37 14804->14806 14809 180115d4f SetLastError 14804->14809 14807 18012ad24 14805->14807 14805->14809 14808 18012eb94 _Wcrtomb 11 API calls 14806->14808 14807->14804 14810 18012ad46 14808->14810 14809->14796 14811 18012ad64 FlsSetValue 14810->14811 14812 18012ad54 FlsSetValue 14810->14812 14814 18012ad82 14811->14814 14815 18012ad70 FlsSetValue 14811->14815 14813 18012ad5d 14812->14813 14816 18012c690 __free_lconv_mon 11 API calls 14813->14816 14817 18012a81c _Wcrtomb 11 API calls 14814->14817 14815->14813 14816->14809 14818 18012ad8a 14817->14818 14819 18012c690 __free_lconv_mon 11 API calls 14818->14819 14819->14809 14829 180126ab4 14820->14829 14878 180126960 14829->14878 14883 18012884c EnterCriticalSection 14878->14883 14963 180105280 14957->14963 14968 1801050f0 14963->14968 14966 180108fa8 Concurrency::cancel_current_task 2 API calls 14967 1801052a2 14966->14967 14971 180108748 14968->14971 14972 180105124 14971->14972 14974 180108769 14971->14974 14972->14966 14973 18010879e 14986 18011bf80 14973->14986 14974->14972 14974->14973 14977 18012a694 14974->14977 14978 18012a6a1 14977->14978 14979 18012a6ab 14977->14979 14978->14979 14984 18012a6c6 14978->14984 14980 180124bfc _Wcrtomb 11 API calls 14979->14980 14981 18012a6b2 14980->14981 14982 18011608c _invalid_parameter_noinfo 55 API calls 14981->14982 14983 18012a6be 14982->14983 14983->14973 14984->14983 14985 180124bfc _Wcrtomb 11 API calls 14984->14985 14985->14981 14987 18012c690 14986->14987 14988 18012c695 HeapFree 14987->14988 14989 18012c6c6 14987->14989 14988->14989 14990 18012c6b0 GetLastError 14988->14990 14989->14972 14991 18012c6bd __free_lconv_mon 14990->14991 14992 180124bfc _Wcrtomb 11 API calls 14991->14992 14992->14989 14993 180006560 14994 180025621 14993->14994 14995 1800256e4 14994->14995 14998 180025705 14994->14998 15006 180067599 14995->15006 14997 1800256f9 14999 180025734 NtAllocateVirtualMemory 14998->14999 15000 18002576a NtProtectVirtualMemory 14999->15000 15002 180025791 14999->15002 15000->15002 15003 180025818 15000->15003 15001 180067599 31 API calls 15004 18002580a 15001->15004 15002->15001 15005 180067599 31 API calls 15003->15005 15005->15004 15007 18006759b 15006->15007 15009 180067474 15006->15009 15010 180039f80 15007->15010 15009->14997 15011 180039f90 15010->15011 15019 18006f820 15011->15019 15013 180039f9f 15014 180039fbf 15013->15014 15043 180039d60 15013->15043 15014->15009 15016 180039fb2 15017 180039fcc 15016->15017 15069 180039fe0 15016->15069 15017->15009 15020 18006f830 15019->15020 15021 18006f851 15020->15021 15022 18006f87e 15020->15022 15083 180036db0 15021->15083 15087 18003c280 15022->15087 15025 18006f871 15025->15013 15026 18006f88a 15027 18006f8d5 15026->15027 15028 18006f893 15026->15028 15030 18006f8e4 15027->15030 15031 18006f92f 15027->15031 15029 180036db0 29 API calls 15028->15029 15034 18006f8b3 15029->15034 15091 180046de0 15030->15091 15105 18007d0c0 15031->15105 15034->15013 15035 18006f8ec 15042 18006f8f0 15035->15042 15118 18003d4e0 15035->15118 15037 180036db0 29 API calls 15038 18006f914 15037->15038 15040 180039fe0 30 API calls 15038->15040 15039 18006f9a3 15039->15013 15041 18006f91c 15040->15041 15041->15013 15042->15037 15042->15038 15042->15039 15044 180039d70 15043->15044 15045 180039f50 15044->15045 15050 180039d8b 15044->15050 15046 180036db0 29 API calls 15045->15046 15047 180039f72 15046->15047 15047->15016 15048 180039e8e 15057 180039efe 15048->15057 15445 18003cec0 15048->15445 15051 180039dcb 15050->15051 15342 180046ce0 15050->15342 15051->15048 15051->15057 15363 180059260 15051->15363 15054 180039dfa 15369 180059490 15054->15369 15057->15016 15058 180046de0 29 API calls 15058->15057 15059 180039e02 15059->15057 15387 180058da0 15059->15387 15061 180039e59 15061->15048 15061->15057 15063 180039e75 15061->15063 15436 180032650 15061->15436 15062 180039e20 15062->15057 15062->15061 15418 18005a2f0 15062->15418 15063->15057 15441 1800322c0 15063->15441 15067 180039e40 15067->15057 15431 180059ca0 15067->15431 15070 180039fe9 15069->15070 15071 18003a094 15069->15071 15070->15071 15072 180046ce0 29 API calls 15070->15072 15071->15014 15073 18003a029 15072->15073 15074 18003d0e0 29 API calls 15073->15074 15075 18003a057 15074->15075 15076 18003c240 DeleteCriticalSection 15075->15076 15077 18003a060 15076->15077 15078 180059260 14 API calls 15077->15078 15079 18003a069 15078->15079 15080 180032040 13 API calls 15079->15080 15081 18003a07b 15080->15081 15082 18003c550 13 API calls 15081->15082 15082->15071 15084 180036dd0 15083->15084 15131 180036780 15084->15131 15086 180036de2 15086->15025 15088 18003c28c 15087->15088 15089 18003c2aa InitializeCriticalSectionAndSpinCount 15088->15089 15090 18003c2bc 15088->15090 15089->15090 15090->15026 15092 180046dec 15091->15092 15093 180046df7 15092->15093 15094 180046e1d 15092->15094 15095 180036db0 29 API calls 15093->15095 15097 180046e65 15094->15097 15098 180046e3f 15094->15098 15096 180046e15 15095->15096 15096->15035 15100 18003c2e0 EnterCriticalSection 15097->15100 15099 180036db0 29 API calls 15098->15099 15101 180046e5d 15099->15101 15102 180046e76 15100->15102 15101->15035 15103 18003c3a0 LeaveCriticalSection 15102->15103 15104 180046eb8 15103->15104 15104->15035 15106 18007d0ca 15105->15106 15107 180083734 15106->15107 15326 180036ef0 15106->15326 15107->15035 15110 18003c2e0 EnterCriticalSection 15116 180083757 15110->15116 15111 18003c3a0 LeaveCriticalSection 15112 180083820 15111->15112 15330 180036ca0 15112->15330 15114 180083825 15114->15035 15115 18008378f 15115->15111 15116->15115 15117 180046ed0 29 API calls 15116->15117 15117->15115 15119 18003d4f2 15118->15119 15334 18003d880 15119->15334 15121 180106610 Concurrency::cancel_current_task 8 API calls 15122 18003d699 15121->15122 15122->15042 15123 18003d5a9 15124 18003c3a0 LeaveCriticalSection 15123->15124 15130 18003d5a7 15124->15130 15125 18003d514 15125->15123 15127 18003d581 15125->15127 15129 18003d5dc 15125->15129 15126 180036db0 29 API calls 15126->15129 15128 18003c3a0 LeaveCriticalSection 15127->15128 15128->15130 15129->15121 15130->15126 15130->15129 15150 180107230 15131->15150 15135 18003687d 15135->15086 15136 1800367a7 15136->15135 15163 18003c1d0 15136->15163 15138 1800367e1 15138->15135 15139 180036851 SetLastError 15138->15139 15166 18003c370 15138->15166 15139->15086 15141 180036803 15141->15135 15142 180036867 15141->15142 15169 1800251a0 15141->15169 15144 18003c370 TlsSetValue 15142->15144 15144->15135 15145 180036830 15145->15142 15146 18003c370 TlsSetValue 15145->15146 15147 180036843 15146->15147 15147->15142 15148 180036847 15147->15148 15149 180024a30 27 API calls 15148->15149 15149->15139 15151 180036790 GetLastError 15150->15151 15152 180024a30 15151->15152 15153 180024a45 15152->15153 15154 180024a57 15153->15154 15156 180024a8e 15153->15156 15155 180036db0 29 API calls 15154->15155 15162 180024a7c 15154->15162 15155->15162 15160 180024ca4 15156->15160 15156->15162 15178 18003c2e0 15156->15178 15158 180024c6c 15181 18003c3a0 15158->15181 15160->15162 15184 1800413f0 15160->15184 15162->15136 15164 180107230 15163->15164 15165 18003c1e0 GetLastError TlsGetValue SetLastError 15164->15165 15165->15138 15167 180107230 15166->15167 15168 18003c37a TlsSetValue 15167->15168 15168->15141 15170 1800251b0 15169->15170 15171 1800251bf 15170->15171 15173 1800251ea 15170->15173 15172 180036db0 29 API calls 15171->15172 15177 1800251dd 15172->15177 15174 18003c1d0 3 API calls 15173->15174 15173->15177 15175 18002525c 15174->15175 15176 18003c370 TlsSetValue 15175->15176 15175->15177 15176->15177 15177->15145 15179 180107230 15178->15179 15180 18003c2ea EnterCriticalSection 15179->15180 15180->15158 15182 180107230 15181->15182 15183 18003c3aa LeaveCriticalSection 15182->15183 15183->15160 15185 1800413fc 15184->15185 15199 18007cb80 15185->15199 15187 180041471 15187->15162 15188 180041404 15188->15187 15209 1800654c0 15188->15209 15214 180046bd0 15188->15214 15219 18004f180 15188->15219 15224 18007d000 15188->15224 15229 18007d1d0 15188->15229 15234 18007d0e0 15188->15234 15239 180071ee0 15188->15239 15244 18004a5d0 15188->15244 15249 18007d3f0 15188->15249 15254 18007cc20 15188->15254 15200 18007cb8a 15199->15200 15201 18007cbd7 15200->15201 15202 18007cbaf 15200->15202 15204 18003c2e0 EnterCriticalSection 15201->15204 15203 180036db0 29 API calls 15202->15203 15205 18007cbd0 15203->15205 15206 18007cbe8 15204->15206 15205->15188 15207 18003c3a0 LeaveCriticalSection 15206->15207 15208 18007cc0e 15207->15208 15208->15188 15211 1800654cc 15209->15211 15210 180065518 15210->15188 15211->15210 15266 180083510 15211->15266 15215 180046bdc 15214->15215 15216 180046c28 15215->15216 15217 180083510 29 API calls 15215->15217 15216->15188 15218 180046c22 15217->15218 15218->15188 15221 18004f18a 15219->15221 15220 18004f1c6 15220->15188 15221->15220 15222 180083510 29 API calls 15221->15222 15223 18004f1c1 15222->15223 15223->15188 15225 18007d00a 15224->15225 15226 18007d046 15225->15226 15227 180083510 29 API calls 15225->15227 15226->15188 15228 18007d041 15227->15228 15228->15188 15231 18007d1da 15229->15231 15230 18007d216 15230->15188 15231->15230 15232 180083510 29 API calls 15231->15232 15233 18007d211 15232->15233 15233->15188 15235 18007d0ea 15234->15235 15236 18007d126 15235->15236 15237 180083510 29 API calls 15235->15237 15236->15188 15238 18007d121 15237->15238 15238->15188 15240 180071eea 15239->15240 15241 180071f26 15240->15241 15242 180083510 29 API calls 15240->15242 15241->15188 15243 180071f21 15242->15243 15243->15188 15246 18004a5dc 15244->15246 15245 18004a628 15245->15188 15246->15245 15247 180083510 29 API calls 15246->15247 15248 18004a622 15247->15248 15248->15188 15251 18007d3fc 15249->15251 15250 18007d448 15250->15188 15251->15250 15252 180083510 29 API calls 15251->15252 15253 18007d442 15252->15253 15253->15188 15255 18007cc2c 15254->15255 15256 18007cc37 15255->15256 15257 18007cc5d 15255->15257 15258 180036db0 29 API calls 15256->15258 15259 18003c2e0 EnterCriticalSection 15257->15259 15260 18007cc55 15258->15260 15261 18007cc6e 15259->15261 15260->15188 15262 18003c3a0 LeaveCriticalSection 15261->15262 15263 18007cc94 15262->15263 15300 1800463f0 15263->15300 15265 18007cc9c 15265->15188 15267 180083529 15266->15267 15268 18003c2e0 EnterCriticalSection 15267->15268 15269 180083547 15268->15269 15274 180083573 15269->15274 15278 18008367a 15269->15278 15279 1800466e0 15269->15279 15271 18003c3a0 LeaveCriticalSection 15272 180065512 15271->15272 15272->15188 15275 1800836e6 15274->15275 15274->15278 15285 180064260 15274->15285 15289 180046ed0 15274->15289 15276 180036db0 29 API calls 15275->15276 15276->15278 15278->15271 15280 1800466ec 15279->15280 15281 180046940 29 API calls 15280->15281 15284 180046731 ctype 15280->15284 15282 180046715 15281->15282 15283 1800476a0 29 API calls 15282->15283 15282->15284 15283->15284 15284->15274 15286 180064282 15285->15286 15287 18003c480 13 API calls 15286->15287 15288 1800642db memcpy_s 15286->15288 15287->15288 15288->15274 15290 180046ee0 15289->15290 15291 180046f21 15290->15291 15295 18003c3a0 LeaveCriticalSection 15290->15295 15292 180046830 29 API calls 15291->15292 15298 180046f5a 15291->15298 15293 180046f36 15292->15293 15294 180046f67 15293->15294 15296 180036db0 29 API calls 15293->15296 15294->15274 15297 180046f0a 15295->15297 15296->15298 15299 18003c2e0 EnterCriticalSection 15297->15299 15298->15274 15299->15291 15302 1800463fc 15300->15302 15301 180046455 15301->15265 15302->15301 15306 18007cf10 15302->15306 15307 180046441 15306->15307 15308 18007cf19 15306->15308 15312 18003d0e0 15307->15312 15308->15307 15309 18003c2e0 EnterCriticalSection 15308->15309 15310 18007cf4f 15308->15310 15309->15310 15310->15307 15311 18003c3a0 LeaveCriticalSection 15310->15311 15311->15307 15313 18003d0f2 15312->15313 15314 18003d880 29 API calls 15313->15314 15320 18003d115 15314->15320 15315 18003d1c9 15316 180106610 Concurrency::cancel_current_task 8 API calls 15315->15316 15318 18003d284 15316->15318 15317 18003d1ae 15319 18003c3a0 LeaveCriticalSection 15317->15319 15318->15301 15325 18003d1aa 15319->15325 15320->15315 15320->15317 15321 18003d184 15320->15321 15323 18003c3a0 LeaveCriticalSection 15321->15323 15322 18003c2e0 EnterCriticalSection 15322->15325 15323->15325 15324 18003c3a0 LeaveCriticalSection 15324->15325 15325->15315 15325->15322 15325->15324 15327 180036efa 15326->15327 15328 180036780 29 API calls 15327->15328 15329 180036f02 15328->15329 15329->15110 15331 180036cac 15330->15331 15332 180036780 29 API calls 15331->15332 15333 180036cb4 15332->15333 15333->15114 15336 18003d88c 15334->15336 15335 18003d8b9 15337 180036db0 29 API calls 15335->15337 15336->15335 15339 18003d8c7 15336->15339 15338 18003d90b 15337->15338 15338->15125 15339->15338 15340 18003c2e0 EnterCriticalSection 15339->15340 15341 18003d8d8 15340->15341 15341->15125 15343 180046cf0 15342->15343 15344 180046cfb 15343->15344 15345 18003c2e0 EnterCriticalSection 15343->15345 15344->15051 15346 180046d15 15345->15346 15349 18003c3a0 LeaveCriticalSection 15346->15349 15361 180046d49 15346->15361 15348 180046d57 15350 180046d89 15348->15350 15351 180046d5b 15348->15351 15352 180046d35 15349->15352 15354 18003c3a0 LeaveCriticalSection 15350->15354 15353 180036db0 29 API calls 15351->15353 15358 18003c2e0 EnterCriticalSection 15352->15358 15355 180046d7b 15353->15355 15359 180046d87 15354->15359 15356 18003c3a0 LeaveCriticalSection 15355->15356 15356->15359 15357 180046dc6 15357->15051 15358->15361 15359->15357 15360 180036db0 29 API calls 15359->15360 15362 180046db9 15360->15362 15361->15355 15463 180046830 15361->15463 15362->15051 15364 1800592b9 15363->15364 15365 180059269 15363->15365 15364->15054 15366 1800592a2 15365->15366 15469 180099040 15365->15469 15473 18004c1e0 15366->15473 15370 18005949c 15369->15370 15371 1800594a7 15370->15371 15372 1800594ce 15370->15372 15373 180036db0 29 API calls 15371->15373 15374 1800594d5 15372->15374 15375 1800594fd 15372->15375 15376 1800594c6 15373->15376 15377 180036db0 29 API calls 15374->15377 15379 180059521 15375->15379 15380 18005954c 15375->15380 15376->15059 15378 1800594f5 15377->15378 15378->15059 15381 180036db0 29 API calls 15379->15381 15383 180032650 29 API calls 15380->15383 15386 18005956f 15380->15386 15382 18005953f 15381->15382 15382->15059 15384 180059562 15383->15384 15385 180032650 29 API calls 15384->15385 15384->15386 15385->15386 15386->15059 15388 180058db0 15387->15388 15389 180058dc3 15388->15389 15390 180058df0 15388->15390 15391 180036db0 29 API calls 15389->15391 15392 180058df5 15390->15392 15397 180058e22 15390->15397 15393 180058de3 15391->15393 15394 180036db0 29 API calls 15392->15394 15393->15062 15396 180058e15 15394->15396 15395 180058e27 15395->15062 15396->15062 15397->15395 15398 180058e84 15397->15398 15399 180058ebf 15397->15399 15401 180058e95 15398->15401 15493 18004c240 15398->15493 15400 18004c1e0 13 API calls 15399->15400 15404 180058eb4 15400->15404 15415 180058fee ctype 15401->15415 15498 18004c150 15401->15498 15405 180058ed8 15404->15405 15410 180058f0c 15404->15410 15404->15415 15406 180058ee9 15405->15406 15407 18005a2f0 29 API calls 15405->15407 15408 180059ca0 29 API calls 15406->15408 15406->15415 15407->15406 15409 180058f02 15408->15409 15412 1800322c0 29 API calls 15409->15412 15409->15415 15416 180058f7e 15409->15416 15410->15409 15411 18003c550 13 API calls 15410->15411 15411->15409 15413 180058f6c 15412->15413 15414 1800322c0 29 API calls 15413->15414 15413->15415 15414->15416 15415->15062 15416->15415 15417 180036db0 29 API calls 15416->15417 15417->15415 15419 18005a2fc 15418->15419 15420 18005a307 15419->15420 15421 18005a32d 15419->15421 15422 180036db0 29 API calls 15420->15422 15423 18005a337 15421->15423 15427 18005a35f 15421->15427 15424 18005a325 15422->15424 15425 180036db0 29 API calls 15423->15425 15424->15067 15426 18005a357 15425->15426 15426->15067 15428 180036db0 29 API calls 15427->15428 15430 18005a3ae 15427->15430 15429 18005a3a1 15428->15429 15429->15067 15430->15067 15432 180059caa 15431->15432 15433 180036db0 29 API calls 15432->15433 15434 180059ce6 15432->15434 15435 180059d19 15433->15435 15434->15061 15435->15061 15437 18003265a 15436->15437 15438 18003269c 15437->15438 15439 180036db0 29 API calls 15437->15439 15438->15063 15440 180032695 15439->15440 15440->15063 15442 1800322d5 15441->15442 15444 1800322f6 ctype 15442->15444 15506 180032f50 15442->15506 15444->15048 15446 18003ceda 15445->15446 15447 18003cfce 15446->15447 15448 18003d880 29 API calls 15446->15448 15449 180106610 Concurrency::cancel_current_task 8 API calls 15447->15449 15453 18003cf09 15448->15453 15450 180039ee4 15449->15450 15450->15057 15450->15058 15451 18003cf96 15452 18003c3a0 LeaveCriticalSection 15451->15452 15454 18003cf94 15452->15454 15453->15447 15453->15451 15459 18003cf6d 15453->15459 15454->15447 15455 18003cfd5 15454->15455 15456 18003cfb0 15454->15456 15513 18003d6b0 15455->15513 15457 180036db0 29 API calls 15456->15457 15457->15447 15460 18003c3a0 LeaveCriticalSection 15459->15460 15460->15454 15461 18003d6b0 29 API calls 15462 18003cff5 15461->15462 15462->15447 15462->15461 15465 180046840 15463->15465 15464 1800468ad 15464->15348 15465->15464 15466 18007cf10 2 API calls 15465->15466 15467 180046899 15466->15467 15468 18003d0e0 29 API calls 15467->15468 15468->15464 15471 180099049 15469->15471 15472 1800990b4 15469->15472 15471->15472 15481 18003c240 15471->15481 15472->15366 15474 18004c1e5 15473->15474 15480 18004c211 15473->15480 15485 180032040 15474->15485 15476 18004c1ff 15477 180032040 13 API calls 15476->15477 15478 18004c208 15477->15478 15479 180032040 13 API calls 15478->15479 15479->15480 15480->15364 15482 18003c245 15481->15482 15484 18003c271 15481->15484 15483 18003c250 DeleteCriticalSection 15482->15483 15483->15484 15484->15472 15486 180032045 15485->15486 15487 180032078 15485->15487 15486->15487 15489 18003c550 15486->15489 15487->15476 15490 18003c555 15489->15490 15492 18003c5bb 15489->15492 15491 18011bf80 __std_exception_copy 13 API calls 15490->15491 15491->15492 15492->15487 15494 18004c24c 15493->15494 15495 180036db0 29 API calls 15494->15495 15497 18004c294 15494->15497 15496 18004c28c 15495->15496 15496->15401 15497->15401 15499 18004c160 15498->15499 15500 18004c19f 15499->15500 15501 1800322c0 29 API calls 15499->15501 15500->15404 15502 18004c17b 15501->15502 15502->15500 15503 1800322c0 29 API calls 15502->15503 15504 18004c18d 15503->15504 15504->15500 15505 1800322c0 29 API calls 15504->15505 15505->15500 15507 180032f6a 15506->15507 15509 180032f8b 15507->15509 15510 180032ff5 15507->15510 15511 180032ff9 ctype 15507->15511 15508 180036db0 29 API calls 15508->15510 15509->15508 15510->15444 15511->15510 15512 18003c550 13 API calls 15511->15512 15512->15510 15514 18003d6c5 15513->15514 15515 18003d6e5 15514->15515 15518 18003d715 15514->15518 15516 180036db0 29 API calls 15515->15516 15517 18003d703 15516->15517 15517->15462 15519 18003d744 15518->15519 15520 180036db0 29 API calls 15518->15520 15519->15462 15520->15519 19496 180002b60 TlsAlloc 19497 180002b78 19496->19497 19498 180002b8b 19496->19498 19499 180106ae4 57 API calls 19497->19499 19501 180023340 std::bad_exception::bad_exception 62 API calls 19498->19501 19500 180106b29 19499->19500 19502 180002baf 19501->19502 19503 180108fa8 Concurrency::cancel_current_task 2 API calls 19502->19503 19504 180002bc0 19503->19504 19505 180022fa0 shared_ptr InitializeCriticalSectionAndSpinCount 19504->19505 19505->19497 14579 18012eb94 14585 18012eba5 _Wcrtomb 14579->14585 14580 18012ebf6 14589 180124bfc 14580->14589 14581 18012ebda RtlAllocateHeap 14583 18012ebf4 14581->14583 14581->14585 14585->14580 14585->14581 14586 1801293dc 14585->14586 14592 18012941c 14586->14592 14598 18012ac28 GetLastError 14589->14598 14591 180124c05 14591->14583 14597 18012884c EnterCriticalSection 14592->14597 14599 18012ac4c 14598->14599 14600 18012ac69 FlsSetValue 14598->14600 14599->14600 14613 18012ac59 SetLastError 14599->14613 14601 18012ac7b 14600->14601 14600->14613 14615 18012eb94 14601->14615 14605 18012aca8 FlsSetValue 14607 18012acb4 FlsSetValue 14605->14607 14608 18012acc6 14605->14608 14606 18012ac98 FlsSetValue 14609 18012aca1 14606->14609 14607->14609 14628 18012a81c 14608->14628 14622 18012c690 14609->14622 14613->14591 14621 18012eba5 _Wcrtomb 14615->14621 14616 18012ebf6 14618 180124bfc _Wcrtomb 10 API calls 14616->14618 14617 18012ebda RtlAllocateHeap 14619 18012ac8a 14617->14619 14617->14621 14618->14619 14619->14605 14619->14606 14620 1801293dc std::_Facet_Register 2 API calls 14620->14621 14621->14616 14621->14617 14621->14620 14623 18012c695 HeapFree 14622->14623 14624 18012c6c6 14622->14624 14623->14624 14625 18012c6b0 GetLastError 14623->14625 14624->14613 14626 18012c6bd __free_lconv_mon 14625->14626 14627 180124bfc _Wcrtomb 9 API calls 14626->14627 14627->14624 14633 18012a6f4 14628->14633 14645 18012884c EnterCriticalSection 14633->14645

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 180001d60-1800022a5 call 180008370 * 3 call 18013eb70 call 180008370 call 18013eb70 call 180008370 * 5 call 18013eb70 call 180008370 call 18013eb70 call 180106664 31 1800022b0-1800022d9 call 18001fba0 0->31 34 180002354-180002362 31->34 35 1800022db-1800022e2 31->35 34->31 38 180002368-18000238c call 180106e94 34->38 36 180002667-18000266c call 18001f070 35->36 37 1800022e8-18000234f call 180106664 call 180008d20 call 18001f920 35->37 45 18000266d-180002672 call 1801160ac 36->45 37->34 47 1800023cb-1800023d2 38->47 48 18000238e-18000239f 38->48 64 180002673-180002678 call 1801160ac 45->64 50 180002411-180002418 47->50 51 1800023d4-1800023e5 47->51 53 1800023a1-1800023b4 48->53 54 1800023ba-1800023c7 call 180106630 48->54 59 180002457-18000245e 50->59 60 18000241a-18000242b 50->60 56 1800023e7-1800023fa 51->56 57 180002400-18000240d call 180106630 51->57 53->54 61 180002661-180002666 call 1801160ac 53->61 54->47 56->45 56->57 57->50 69 18000249d-1800024a4 59->69 70 180002460-180002471 59->70 66 180002446-180002453 call 180106630 60->66 67 18000242d-180002440 60->67 61->36 79 180002679-18000267e call 1801160ac 64->79 66->59 67->64 67->66 72 1800024e3-1800024ea 69->72 73 1800024a6-1800024b7 69->73 77 180002473-180002486 70->77 78 18000248c-180002499 call 180106630 70->78 84 180002529-180002530 72->84 85 1800024ec-1800024fd 72->85 82 1800024d2-1800024df call 180106630 73->82 83 1800024b9-1800024cc 73->83 77->78 77->79 78->69 90 18000267f-180002684 call 1801160ac 79->90 82->72 83->82 83->90 87 180002532-180002543 84->87 88 18000256f-180002576 84->88 93 180002518-180002525 call 180106630 85->93 94 1800024ff-180002512 85->94 95 180002545-180002558 87->95 96 18000255e-18000256b call 180106630 87->96 97 1800025b5-1800025bc 88->97 98 180002578-180002589 88->98 102 180002685-18000268a call 1801160ac 90->102 93->84 94->93 94->102 95->96 104 18000268b-180002690 call 1801160ac 95->104 96->88 109 1800025fb-180002602 97->109 110 1800025be-1800025cf 97->110 106 1800025a4-1800025b1 call 180106630 98->106 107 18000258b-18000259e 98->107 102->104 117 180002691-180002696 call 1801160ac 104->117 106->97 107->106 107->117 114 180002634-180002656 109->114 115 180002604-180002618 109->115 119 1800025d1-1800025e4 110->119 120 1800025ea-1800025f7 call 180106630 110->120 126 180106b20-180106b24 call 180106ae4 114->126 123 18000261a-18000262d 115->123 124 18000262f call 180106630 115->124 128 180002697-1800026a4 call 1801160ac call 18001fe80 117->128 119->120 119->128 120->109 123->124 131 18000265b-180002660 call 1801160ac 123->131 124->114 138 180106b29-180106b36 126->138 141 1800026a9-1800026b4 128->141 131->61 141->126
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
      • String ID: )7CC$)7}$$-TES$4(P^$ANDA$EICA$H+H*$IRUS$L$LE!$$MSCF$NTIV$P%@A$PZX5$P[4\$R-ST$RD-A$Rar!$Rar!Rar!$T-FI$X5O!
      • API String ID: 3936042273-42239843
      • Opcode ID: 1a2d1d1cae48639a1bf825e4c12e92b31543beafbb8b1ed0150fcf9411e74a73
      • Instruction ID: f65e32fc1529cad7a00d9ef93ac9e0bce8ed8251db96144b5fa9cecdc263a2d9
      • Opcode Fuzzy Hash: 1a2d1d1cae48639a1bf825e4c12e92b31543beafbb8b1ed0150fcf9411e74a73
      • Instruction Fuzzy Hash: 41424973A11BC489EB61CF75E8843DD33A5F7887A8F208715EA981AB99DF74C284C740

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: MemoryVirtual$AllocateProtect
      • String ID: %$+$+$4$D$H$M$U$e$g$i$k$v$y$y$z
      • API String ID: 2931642484-2653694703
      • Opcode ID: 29ae91233c9e2a0f6e91985882b77d90a3ef669daaed8ef0da2c19573c3da0e6
      • Instruction ID: 65144e74e28f08dbd9014b17249a5266b53b2c5cc9101eb6481addb504c11909
      • Opcode Fuzzy Hash: 29ae91233c9e2a0f6e91985882b77d90a3ef669daaed8ef0da2c19573c3da0e6
      • Instruction Fuzzy Hash: C351D37220DBC486E7529764B40478AAB91E3897E8F544225F7D90BBC9DFBDC10DCB14
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ErrorFreeHeapLast
      • String ID:
      • API String ID: 485612231-0
      • Opcode ID: e1f295aa13e5ef76a22ddaed4986782ce05a382e3253e5ee7e8977a23b813279
      • Instruction ID: 944969eb6665ad90594a193c0f285eaebd773b5436d63678d6c4f0510345ffff
      • Opcode Fuzzy Hash: e1f295aa13e5ef76a22ddaed4986782ce05a382e3253e5ee7e8977a23b813279
      • Instruction Fuzzy Hash: 64419272310A5886EF85CF2AD91839973A2B74CFE0F49D026EE0D87B54EE7CC5498304
      Memory Dump Source
      • Source File: 00000005.00000003.1746111540.000001D562F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D562F90000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_3_1d562f90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
      • Instruction ID: c9e1defc526e0ee5ddaea0710439a88126e59a88e9852f827e13684eaa32a9ec
      • Opcode Fuzzy Hash: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
      • Instruction Fuzzy Hash: 93F081B0628B408BE7449F2984CA676B7E1FBD8755F64452EE889C7361CB319842CB43
      Memory Dump Source
      • Source File: 00000005.00000003.1746111540.000001D562F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D562F90000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_3_1d562f90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
      • Instruction ID: 28d33e63a436d60fa468d90c65c192bcef93cb1386ed433a6c4c0ee212165df7
      • Opcode Fuzzy Hash: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
      • Instruction Fuzzy Hash: 82F05470B24F448BD704AF2C888A67677D2FBE8745F94452EE848C7361DB35E5428B43

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Allocstd::bad_exception::bad_exception
      • String ID: cannot allocate thread context key
      • API String ID: 287486779-1710566765
      • Opcode ID: 70f5ec321c4b3483aab5bc5a2522a323dc813696c1eb10960a0e64ce664ba700
      • Instruction ID: 3eb9b5f93a8efaf96118b30193394a4e6d026d19488291b2ffbd53e73d27dd25
      • Opcode Fuzzy Hash: 70f5ec321c4b3483aab5bc5a2522a323dc813696c1eb10960a0e64ce664ba700
      • Instruction Fuzzy Hash: 6A014F7172090DD1E692FB34E89A3D87365BB9D368FD08112D14D825F6DE28C75EC700

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Startupstd::bad_exception::bad_exception
      • String ID: Failed to initialize network subsystem
      • API String ID: 36264510-1820565237
      • Opcode ID: 352e269cbea8bc61e3b80d515c178517ace928a2895d31e5eb89a4d4d5db4166
      • Instruction ID: 2ad56a504399f77fca66a98e9298a4838375de0c8b08391d47cfbd9bbf6bfd2d
      • Opcode Fuzzy Hash: 352e269cbea8bc61e3b80d515c178517ace928a2895d31e5eb89a4d4d5db4166
      • Instruction Fuzzy Hash: B1F03772214D4DD1EBA1EB14E8893E96363F799354FC09025A28D478BBEE6CC70DCB00
      Strings
      Memory Dump Source
      • Source File: 00000005.00000003.1746111540.000001D562F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D562F90000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_3_1d562f90000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
      • Instruction ID: a0ddde8c974665b230d9b5568c670cdb52e63849f105c27492e28f2a9abe3987
      • Opcode Fuzzy Hash: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
      • Instruction Fuzzy Hash: 81B1833121CE088FDB54EF1CD885BAAB7E1FB98350F51456AE44EC7295DB34E845CB82
      APIs
      Memory Dump Source
      • Source File: 00000005.00000003.1746111540.000001D562F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D562F90000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_3_1d562f90000_rundll32.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: dda5bd23e4ac47bd42f6dd929fb15fd9a0e68714a6453c9134859c40f5c4eed3
      • Instruction ID: 4a9eb1ea1dcbface17b67bfab37fa50aaa580aaf209ac93b0438faf4b05f3f00
      • Opcode Fuzzy Hash: dda5bd23e4ac47bd42f6dd929fb15fd9a0e68714a6453c9134859c40f5c4eed3
      • Instruction Fuzzy Hash: 48012D30729D2A4BE7D9A779A8D1BE3B6C2F795350F944056D80EC72C6D925CCC14380

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 202 18013400c-18013401f 203 180134021-180134029 call 18012c6cc 202->203 204 18013402b-18013402e 202->204 212 18013404a-180134054 203->212 206 180134037-18013403b 204->206 207 180134030-180134035 call 18012c690 204->207 210 18013406a-180134082 RtlReAllocateHeap 206->210 211 18013403d-180134042 call 180124bfc 206->211 218 180134048 207->218 213 180134084 210->213 214 180134055-18013405c call 180139d1c 210->214 211->218 213->212 214->211 221 18013405e-180134068 call 1801293dc 214->221 218->212 221->210 221->211
      APIs
        • Part of subcall function 000000018012C6CC: HeapAlloc.KERNEL32(?,?,00000000,0000000180126ECB), ref: 000000018012C70A
      • RtlReAllocateHeap.NTDLL(?,?,00000000,000000018012A65B,?,?,?,000000018012A0B7,?,?,?,0000000180129FAD,?,?,?,000000018012A38E), ref: 0000000180134079
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Heap$AllocAllocate
      • String ID:
      • API String ID: 2177240990-0
      • Opcode ID: cbf9e1bcc966571a6f1044025fffae21e333bb6e3deebf2d98a299e414a4521b
      • Instruction ID: f695400d6f30680e5f9617c48cc471e8a6d1151c8eb51c0e9e368cd19eb7ef02
      • Opcode Fuzzy Hash: cbf9e1bcc966571a6f1044025fffae21e333bb6e3deebf2d98a299e414a4521b
      • Instruction Fuzzy Hash: 7E016D7230060942FEDAAB6165893EA13915B8C7F0F1AD221BB25462D6DE2CD6084700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 224 18012eb94-18012eba3 225 18012ebb3-18012ebc3 224->225 226 18012eba5-18012ebb1 224->226 228 18012ebda-18012ebf2 RtlAllocateHeap 225->228 226->225 227 18012ebf6-18012ec01 call 180124bfc 226->227 233 18012ec03-18012ec08 227->233 229 18012ebf4 228->229 230 18012ebc5-18012ebcc call 180139d1c 228->230 229->233 230->227 236 18012ebce-18012ebd8 call 1801293dc 230->236 236->227 236->228
      APIs
      • RtlAllocateHeap.NTDLL(?,?,00000000,000000018012AC8A,?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012EBE9
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: 1bbd031e9b40aaa3df7e7cfd2382faa7c78f8fa622478c522076619262ec1d53
      • Instruction ID: 2f222e57a63ab880ed9cbf42d716b4e0d6c647b669ae0dc4a7462a43906732ee
      • Opcode Fuzzy Hash: 1bbd031e9b40aaa3df7e7cfd2382faa7c78f8fa622478c522076619262ec1d53
      • Instruction Fuzzy Hash: 16F01DB530260946FEE7D6A999593D513D55B4EBA0F0CD4309D0F863D6EE5DC6884310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Handle$CloseErrorLast$Module$AddressCreateProcSnapshotToolhelp32$FirstLibraryLoadModule32OpenProcessQuerySleepVirtual
      • String ID: Crypto$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Crypto.cpp$Failed to load psapi.dll = %u$GetModuleInformation$GetModuleInformation = %p$ImageNotify: Image has unusual memory protection!! %u - %s$ImageNotify: Image has unusual memory protection!! (%zu) (%u) PID = %u - %s$K32GetModuleInformation$K32GetModuleInformation = %p$VerifyImage Failed to open the process %u- %u$VerifyImage failed to get base address from module handle %u (GetModInfo = %p)$VerifyImage failed to get module handle - %u$VerifyImage failed to get module information - %u$VerifyImage got base address from module handle %p$kernel32.dll$mb::common::crypto::VerifyImage$psapi.dll
      • API String ID: 1552750388-2544890722
      • Opcode ID: cbc42031f762b81ed146b49916ee564eac4c9e52cfbada4c05aeaa6be7a08a72
      • Instruction ID: 788443a6203ae7b63ad1ef169ede3e5baaab21628117a0fbacbdca54153a5daf
      • Opcode Fuzzy Hash: cbc42031f762b81ed146b49916ee564eac4c9e52cfbada4c05aeaa6be7a08a72
      • Instruction Fuzzy Hash: B4E12876204B4882E7A2CF11F8887D977A5F78CBA5F448116EA8E477A5DF38C60DCB04
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Crypt$AlgorithmProvider$CloseDestroyOpen
      • String ID: $**** Error 0x%x returned by BCryptOpenAlgorithmProvider$****> Failed to import public key - %x$0$@$ConnectW$ConnectWise certificate is trusted!$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cpp$Failed to import the public key - %x$ImportRsaPublicKeyX$Kaseya Limited$Kaseya certificate is trusted!$MD5$Malwareb$MbCommonSigCRYPTUSR$RSA$RSAPUBLICBLOB$SHA1$SHA256$SHA384$SHA512$VerifyTrusted$ise, Inc$ytes
      • API String ID: 2054559242-2717880233
      • Opcode ID: cc0a3cb7e0da9c7ff66ae0a5c9362b601b2ca27709e9a57ede8521292f8f2120
      • Instruction ID: 91263c3910ef83fdbdd24a69e8ba3a9f61853925db0fc0cbaca4464654ca9d14
      • Opcode Fuzzy Hash: cc0a3cb7e0da9c7ff66ae0a5c9362b601b2ca27709e9a57ede8521292f8f2120
      • Instruction Fuzzy Hash: 3DA16B76604F88C5EBA68B05E4483E977A5F78CBD5F858016EA894B7A4DF38CA4DC700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Crypt$AlgorithmPropertyProvider$CloseConcurrency::cancel_current_taskDestroyHashOpen_invalid_parameter_noinfo_noreturn
      • String ID: **** Error 0x%x returned by BCryptCreateHash$**** Error 0x%x returned by BCryptFinishHash$**** Error 0x%x returned by BCryptGetProperty getting hash length$**** Error 0x%x returned by BCryptGetProperty getting object length$**** Error 0x%x returned by BCryptHashData$**** Error 0x%x returned by BCryptOpenAlgorithmProvider - Hash$**** Invalid hash buffer: %p$**** Invalid hash size: %u, need %u$**** memory allocation failed$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cpp$HashDigestLength$MD5$MbCommonSigCRYPTUSR$MbHashMemory$ObjectLength$SHA1$SHA256$SHA384$SHA512
      • API String ID: 860087726-4021669043
      • Opcode ID: 5c1f8620c86830096c7b504056d06b58c2052937ddca11c143a02181f65b63d5
      • Instruction ID: 9e2ce5262259e5bcabe6f94ea6a9927640127448378a215be27b5a32b5f0547c
      • Opcode Fuzzy Hash: 5c1f8620c86830096c7b504056d06b58c2052937ddca11c143a02181f65b63d5
      • Instruction Fuzzy Hash: 30D16F72204B48C5EBA2CB55F4847EDB7A1F78C7E5F808116EA894BBA5DF78C649C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Crypt$AlgorithmDestroyProvider$CloseImportOpenPairSignatureVerify
      • String ID: **** Error 0x%x returned by BCryptOpenAlgorithmProvider$**** Failed to import public key - %x$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\CryptoUser.cpp$Failed to import the public key - %x$ImportRsaPublicKeyX$MD5$MbCommonSigCRYPTUSR$RSA$RSAPUBLICBLOB$SHA1$SHA256$SHA384$SHA512$Verify signature returns %x$VerifyData
      • API String ID: 2019841491-4080738847
      • Opcode ID: fa68690fadab714d053d2eb5b514d88ae2da970e409a4c86a8b986e7abd24159
      • Instruction ID: ed980101c0dda834f3209737b7ad7eaa71b32689e90ce2458d719ec637e924eb
      • Opcode Fuzzy Hash: fa68690fadab714d053d2eb5b514d88ae2da970e409a4c86a8b986e7abd24159
      • Instruction Fuzzy Hash: F361AC76204B4892E7A2CF11F8947DA77A5F78C7A4F948116EA8E43B65DF38C64DCB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Process$ErrorLast_invalid_parameter_noinfo_noreturn$FileImageNameOpen$CloseHandle
      • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\ProcessUtils.cpp$GetProcessImageFileName for [%d] failed with error [%d]. Cannot get the process path!$OpenProcess call with pid [%d] failed with error [%d]. Cannot get the process path!$ProcessUtils$mb::common::system::ProcessUtils::GetProcessPath
      • API String ID: 1575040863-3696580403
      • Opcode ID: 29f233a9cbda2f60c6aaac86fea4f902b3204e52b0f38eaf970a43707461ded7
      • Instruction ID: e96932dfd46c146b027ab0e3fe9f41d0e7c323a40ef06e91f34071805e990d49
      • Opcode Fuzzy Hash: 29f233a9cbda2f60c6aaac86fea4f902b3204e52b0f38eaf970a43707461ded7
      • Instruction Fuzzy Hash: EFA1AD72711F48C5EB92CF65E4883DD23A1E78DBE5F408621EA9D1BB99DE78C649C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 155f8ec017a0ba7ffc1716aa04d01c066c65c88c059d2bce09e4d6e3f582fb89
      • Instruction ID: e64712b9f006329b85b2faee8822a5d2b8dc3ae68b58e218b1303014f36bdc9b
      • Opcode Fuzzy Hash: 155f8ec017a0ba7ffc1716aa04d01c066c65c88c059d2bce09e4d6e3f582fb89
      • Instruction Fuzzy Hash: 0AB2E3727142888BF7A6CF64D8487ED77A1F3583A8F919115DA0A57E88DF39DB08CB40
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: DEBUG$Date{0}Time{0}Tick Count{0}Process ID{0}Thread ID{0}Log Level{0}Context Tag{0}Function Name{0}File Name{0}Line Number{0}Message$ERROR$INFO$NONE$TRACE$UNKNOWN$WARNING${0}$O)
      • API String ID: 0-1175394839
      • Opcode ID: 3ec266ce1dfb9ad681a2d774538e3080bea715b79c42faf1737142f89fa23282
      • Instruction ID: e728865471310377dd45c6c8a3a48b35043e9632576cc2786ca7e8ba21f050cb
      • Opcode Fuzzy Hash: 3ec266ce1dfb9ad681a2d774538e3080bea715b79c42faf1737142f89fa23282
      • Instruction Fuzzy Hash: 55B1CF72610B8881EB52DF25E4943DD7361F78DBD8FA1D212EAAC076A5DF78C689C340
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$ExclusiveLock$Acquire$Concurrency::cancel_current_taskDeviceDriveLogicalQueryReleaseStrings
      • String ID:
      • API String ID: 4260757983-0
      • Opcode ID: d557855fa708ce906f49ab260f81f0c610c0e0c19cfdf631ec2296b3be148232
      • Instruction ID: db5d558c1e9556029db17fd4af993c84ea7a7e714190a018784b6b6843ff1089
      • Opcode Fuzzy Hash: d557855fa708ce906f49ab260f81f0c610c0e0c19cfdf631ec2296b3be148232
      • Instruction Fuzzy Hash: 19025172B10F8985FB42DB65E4453ED2362A78D7E8F509311EAA8166E9DF78C688C300
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: 8b76dab4a3857abd9779c3005433230d7221e9e5bf1173b1d060ab8efcc8499b
      • Instruction ID: 6fbe0a5ab35caa0a7a8088efd5404cf088294dffa798bee2e61c09e7e7bb2285
      • Opcode Fuzzy Hash: 8b76dab4a3857abd9779c3005433230d7221e9e5bf1173b1d060ab8efcc8499b
      • Instruction Fuzzy Hash: 04319236214F8486DBA1CF25E8843DE73A0F78C768F544116EA9D47BA5EF38C649CB00
      APIs
      Strings
      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00000001801078CB
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: DebugDebuggerErrorLastOutputPresentString
      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
      • API String ID: 389471666-631824599
      • Opcode ID: ac4f2ae6db917f4f87e37bddf6db85f629462927a0db851ef5fe58545d8aa7dc
      • Instruction ID: c62aa922f7e8e0fdb41f07d84f43fcc2a9736de30d8fad2d158327afe1407b89
      • Opcode Fuzzy Hash: ac4f2ae6db917f4f87e37bddf6db85f629462927a0db851ef5fe58545d8aa7dc
      • Instruction Fuzzy Hash: 13115E32310B88A7F786DB22E6583E933A1FB4C365F44C025CB5942A61EF78D6B8C710
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: 8cb0d471114c2351560cf57080cdf1a54f3117c3f47b117ae357acb3e1abe895
      • Instruction ID: eb508fc792b5aef0349723997834eec7494c9d46332be5394ead55717787b15d
      • Opcode Fuzzy Hash: 8cb0d471114c2351560cf57080cdf1a54f3117c3f47b117ae357acb3e1abe895
      • Instruction Fuzzy Hash: 22110C36711F048AEB81CF64E8593E833A5F75DB68F441E25EE6D86BA4DF78C2588340
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: 58c5b441fcc557dde308f798edace5a3fe026a1be206aa60db9152cb5b0e9c63
      • Instruction ID: dea16717a6459461c981bc694ef17a16d0c3dd845920b794801fa674b0c0ca1a
      • Opcode Fuzzy Hash: 58c5b441fcc557dde308f798edace5a3fe026a1be206aa60db9152cb5b0e9c63
      • Instruction Fuzzy Hash: F9C139B271428987EB75CF19E04D79AB7A1F388B94F40C225DB8A57784DB39DA09CB40
      APIs
      • _invalid_parameter_noinfo.LIBCMT ref: 0000000180126BE8
      • SetConsoleCtrlHandler.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000180125818), ref: 0000000180126E04
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,0000000180125818), ref: 0000000180126E17
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ConsoleCtrlErrorHandlerLast_invalid_parameter_noinfo
      • String ID:
      • API String ID: 2654339681-0
      • Opcode ID: b03e703916e1046b10f3869a232b6324562162d81a8b82174c66de663d7c94bc
      • Instruction ID: 0cad5d6a7708ec7627c2b370556e12f9c2e07c11c99113340310ae9708483d7b
      • Opcode Fuzzy Hash: b03e703916e1046b10f3869a232b6324562162d81a8b82174c66de663d7c94bc
      • Instruction Fuzzy Hash: F6C1BEB260164C86FAE7DB28D45C3EA27A1E79C7A2F55C425DA4A077F5DE38CB4D8300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: InfoLocale
      • String ID: GetLocaleInfoEx
      • API String ID: 2299586839-2904428671
      • Opcode ID: c58fa79b402e6919386ef5694a0162a6e22420b1c41b766446516c9eeb2e969a
      • Instruction ID: 8364a61e272f7459822ab890d2611de5c775059b9af069b8d611d1f8da2e32a8
      • Opcode Fuzzy Hash: c58fa79b402e6919386ef5694a0162a6e22420b1c41b766446516c9eeb2e969a
      • Instruction Fuzzy Hash: D601A734700A448AE7C29B86B4483DBB7A1BB9CFE0F95C0259E4913B66CE38CA498340
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 351bdbe885c120d7f1782725b4111b1a2e01d45fdac977c756f5949d11557b11
      • Instruction ID: a5246351395ead6ace41139514bdf3c781a7c67c369d30a528861335f28cd911
      • Opcode Fuzzy Hash: 351bdbe885c120d7f1782725b4111b1a2e01d45fdac977c756f5949d11557b11
      • Instruction Fuzzy Hash: DDB11F77600B888FEB56CF29C88A39D7BA0F348B68F16C915DB5987BA4CB39C555C700
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: $
      • API String ID: 0-227171996
      • Opcode ID: f37e5461d795ae9f8fc3c5a30e3aa09c1da45a80f3de5b0be8a66d2bc7a72cad
      • Instruction ID: 49e058d1f621dd75d3ae7e20055d9f1bf5ae8eb1af5a11b8716a30c85fa3d411
      • Opcode Fuzzy Hash: f37e5461d795ae9f8fc3c5a30e3aa09c1da45a80f3de5b0be8a66d2bc7a72cad
      • Instruction Fuzzy Hash: 44E1D732204E4886FBEE8E2981583AD3BA1F74DB68F98E215DA46077D4DF35CA59C700
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: e+000$gfff
      • API String ID: 0-3030954782
      • Opcode ID: a0b4a98d576a10a6e3a0da15dd5e8e4746293ad3541659e3aa334c552677f52b
      • Instruction ID: f6e58dc7970a1d26dd0adf9c08be4621f1eb0c8160bce8016cb9768a45f6ae82
      • Opcode Fuzzy Hash: a0b4a98d576a10a6e3a0da15dd5e8e4746293ad3541659e3aa334c552677f52b
      • Instruction Fuzzy Hash: D6517AB27146CC46E7A6CE35A808799BB91E35CBA4F49D221CBA44BAC5CF39C649C700
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID:
      • API String ID: 1452528299-0
      • Opcode ID: 32ae0cb38b3b69d83d12af6681f0a3ce2392bd4ef5a70b5fea58a58a172fff2d
      • Instruction ID: ecb3a429b116fcf64368373afd7e3ac527559c729b42e18b68529803189b8f9e
      • Opcode Fuzzy Hash: 32ae0cb38b3b69d83d12af6681f0a3ce2392bd4ef5a70b5fea58a58a172fff2d
      • Instruction Fuzzy Hash: 1DD1C3B260478886E7F6DF25E0483A97B90F78D7A4F54C225DB8947B95DF7CC6488B00
      APIs
      • EnumSystemLocalesW.KERNEL32(?,?,00000000,00000001801301F7,?,?,?,?,?,?,?,?,00000000,0000000180138A00), ref: 000000018012FDF7
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: EnumLocalesSystem
      • String ID:
      • API String ID: 2099609381-0
      • Opcode ID: 7a83e8bc964b767d18a3dccc9881b21e24547f6a8c854c59aa3a223554baed0a
      • Instruction ID: 02696fc78f1fcaa263e9141234fab4a06aa5e1d6719a252db0625d7baa23e7be
      • Opcode Fuzzy Hash: 7a83e8bc964b767d18a3dccc9881b21e24547f6a8c854c59aa3a223554baed0a
      • Instruction Fuzzy Hash: B4F03CB2300B4887E785DB29E8983DA7367F79CBC0F94D029EA4983765DE78C6598300
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: gfffffff
      • API String ID: 0-1523873471
      • Opcode ID: 3c05b74dc7d3b59526d61f6f1df35647b34b7f0f29bb2ff571977b3eaa776d9e
      • Instruction ID: 0ad7334c65485f9f62971b9ca8978406d82dbfa592b7c05e8838b2e1b4e3bdfb
      • Opcode Fuzzy Hash: 3c05b74dc7d3b59526d61f6f1df35647b34b7f0f29bb2ff571977b3eaa776d9e
      • Instruction Fuzzy Hash: 39A145B37057CC86EBA6CB29A4147EA7B90E359BE4F05C122DF8947795EA3DC609C700
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: 8e8e8880b988a86fe12b3d04fec3431f0dcfae1117074ff7f9f921cd0f14eac8
      • Instruction ID: 92ca1c19978f7e98e1dc79a382196f8d49c5b8aae83ff91a3c9d075087d87231
      • Opcode Fuzzy Hash: 8e8e8880b988a86fe12b3d04fec3431f0dcfae1117074ff7f9f921cd0f14eac8
      • Instruction Fuzzy Hash: 7AB1A172105F5886EBAA8F29C0983EC3BA0F74DB68F28E116CB4A47395CF31C659C755
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction ID: b266238800c3099d4c7d16965a207078b382afbec0b3959330b3dbe103fe048b
      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction Fuzzy Hash: D2518236320E5882E7AA8B29C04839C37B1F74DB78F24A111DE5917B98CB36DA57D740
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction ID: 03f34c0eb881ddf5f502b3628062a6a47f64f1b8239020765bd4c6c594425803
      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction Fuzzy Hash: 37518076314E5886E7AA8F29D04839D37B1E74CF78F24A111CE4917BA8DB36DA47C780
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction ID: c90048feb344b5a07ce75a192268b1176897b3dbb599d5942664696d53f56c25
      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction Fuzzy Hash: 77517F36710E5886E7AA8B29D04C39837B1E34DB78F24A111CE4917BE8CB36DA47C780
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bf36178eee3e05a9df7ae4174492d72a955a1e5a924f83978aff5b384c443cef
      • Instruction ID: cc2829d54de1894aea31ff42c54a9275b60a420315146979c47b57ee77199df6
      • Opcode Fuzzy Hash: bf36178eee3e05a9df7ae4174492d72a955a1e5a924f83978aff5b384c443cef
      • Instruction Fuzzy Hash: FA517F36320E5886E7AA8B29D05839C77B0E74CB7CF28E111CE4917B95DB36CA5BC740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: CreateErrorFileLast
      • String ID: %ws verification status - %x - IsMbam = %u$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\FileVerify.cpp$Error allocating memory for file data$File Not Found - %x$File Size Error$MbCommonSigVerify$Read file Error$VerifyFile$VerifyFile attempting to open %ws
      • API String ID: 1214770103-1110068639
      • Opcode ID: 307ac1770580ba3d592c58be44ea0f0f5cd9a0c4409d3336b534dacfa44d8c4d
      • Instruction ID: 11652f6c9eee8c16f10a3420f6e9143ef996b92be0c75af00192d30ce4594539
      • Opcode Fuzzy Hash: 307ac1770580ba3d592c58be44ea0f0f5cd9a0c4409d3336b534dacfa44d8c4d
      • Instruction Fuzzy Hash: 7B815C76204B8886E7A1CB11E84479E77A4F78DBE4F408115EA9D47BA6DF3CC608CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: \\.\Globalroot
      • API String ID: 3668304517-3084389310
      • Opcode ID: c1c51882aed7f50c725de7d56c11ff9d4f12b11390d09ca5d81619b85898036f
      • Instruction ID: 63d7ba85a87c813fe84413dbf665f9926105d667c37b972e7311ef1f595220e1
      • Opcode Fuzzy Hash: c1c51882aed7f50c725de7d56c11ff9d4f12b11390d09ca5d81619b85898036f
      • Instruction Fuzzy Hash: BD418472B11E4985FF47EB78D0493ED12229B8D7F4F40AB01BA6816AEADE65C249C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$EventFileInfoResetVersion$LibraryLoadMultipleMutexObjectsQueryReleaseSizeValueWait
      • String ID: D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp$Failed to load '%s', %s$Failed to load function ptrs for '%s'$File version %u.%u.%u.%u for '%s'$mb::common::system::DynamicLibrary::Load
      • API String ID: 4026781392-3082813674
      • Opcode ID: b1015c23e17ff9f6e18201f766be76b5944456af77c8d30d255385afce82add6
      • Instruction ID: cbabf07e28f1668f3db32a59947f7a559444b3bbfa617106ad4ec1bbbac74f0c
      • Opcode Fuzzy Hash: b1015c23e17ff9f6e18201f766be76b5944456af77c8d30d255385afce82add6
      • Instruction Fuzzy Hash: 14D1CD72B10B4895EB91DF65E4843EC33B1F798BD8F008616EA5D17AA9DF38C699C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: \\?\
      • API String ID: 3668304517-4282027825
      • Opcode ID: c153c970744e3ff2ac1a733991df761227dc1e397997b5b26c4c23c3766a7f33
      • Instruction ID: 63a2ac9ff495613dcd4add744bea60c538b8f00e60c4357e3b1501531ff59648
      • Opcode Fuzzy Hash: c153c970744e3ff2ac1a733991df761227dc1e397997b5b26c4c23c3766a7f33
      • Instruction Fuzzy Hash: 3951B672B11F4985FF46DB78D0493EC23629B8D7F4F40D701AA6C16AEADE65C289C380
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3668304517-0
      • Opcode ID: 1aceb5f987f3b3742d416ac2d6fb94983d95fa97e2ad7047d90991908b41cd68
      • Instruction ID: 37caab9f01e1003b77e7c8090618f661dfee8657723bdb68d57d04bec796e96a
      • Opcode Fuzzy Hash: 1aceb5f987f3b3742d416ac2d6fb94983d95fa97e2ad7047d90991908b41cd68
      • Instruction Fuzzy Hash: 08618272B11E4985FF46DB78C0493ED13229B8D7F8F409B01BA6C1A6EADE65C289C340
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Value$ErrorLast$Heap$AllocateFree
      • String ID:
      • API String ID: 3174826731-0
      • Opcode ID: d27ea102324cb3148a835abbd1a234bb90ff1a8b5c084474f55cc09aa745f896
      • Instruction ID: 525182d9fe85fdeaa0cb1f2338849a7f9d30ddb055702e12c3b71842699ac447
      • Opcode Fuzzy Hash: d27ea102324cb3148a835abbd1a234bb90ff1a8b5c084474f55cc09aa745f896
      • Instruction Fuzzy Hash: 3D41537030120C47FAEBE7B1699D3EA63835B4C7B0F94D724A9364B6D6ED68D6498300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$AddressProc
      • String ID: Could not load '%s' function ptr from DLL because DLL is not loaded$Could not load '%s' function ptr from DLL, %s$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp$mb::common::system::DynamicLibrary::GetFunctionAddress
      • API String ID: 1230731272-560569770
      • Opcode ID: 1fef4f74c05ee2d78553d6c1d76f499fa895c5e38613afa3b0117b4ca4a0fd19
      • Instruction ID: 2d62702eddbb558de309e16dbec1e386c5a102024c7951b4589988eaaaf8c99c
      • Opcode Fuzzy Hash: 1fef4f74c05ee2d78553d6c1d76f499fa895c5e38613afa3b0117b4ca4a0fd19
      • Instruction Fuzzy Hash: 24A17F72B11B4895EB91DB69D4543ED33A1FB487E8F40D612EAAC07A99DF39C689C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$f$p$p$f
      • API String ID: 3215553584-1325933183
      • Opcode ID: 60cc5941032d4e73c70e6236033a5792d810f6054c6545baca1d3859597e7a10
      • Instruction ID: 1da7f3d17b81cf6398a85a4ad5d22cd62852d82a194764ff71d46eb388f96ab5
      • Opcode Fuzzy Hash: 60cc5941032d4e73c70e6236033a5792d810f6054c6545baca1d3859597e7a10
      • Instruction Fuzzy Hash: 6E12F67270494A86FBAB9B14F15C3F97261F348770F84D015E6C547AE8DF3ACA898B50
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task__std_exception_copy
      • String ID: ios_base::failbit set
      • API String ID: 3630682930-3924258884
      • Opcode ID: c009e20e0163d43c03b6c8245f5196e59524e9394bb8ed14474b75b32bd38d0c
      • Instruction ID: b92572973f6f056b71fb1a3a17d0bce48dbe57363f560e11b7e88f697490d759
      • Opcode Fuzzy Hash: c009e20e0163d43c03b6c8245f5196e59524e9394bb8ed14474b75b32bd38d0c
      • Instruction Fuzzy Hash: 0EC1D032615B8881EB92DB25E4453ED7361E78DBE4F10D221EAAC067E6DF78C699C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: AUX$COM$CON$LPT$NUL$PRN$\\.\
      • API String ID: 3668304517-431953350
      • Opcode ID: 50c9fd94dec52d2418c9c4644ecb9a1058296973547e3872325ecbe4daeaa39f
      • Instruction ID: 38d949412858d7621a5721e595f2d056ef18627934969283c6c0347f1df82c58
      • Opcode Fuzzy Hash: 50c9fd94dec52d2418c9c4644ecb9a1058296973547e3872325ecbe4daeaa39f
      • Instruction Fuzzy Hash: 747194B3714A88D1EFA28B25D0153E9B3A1F369BD4F94C112FA8D47694DE69CF4AC700
      APIs
      • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000018000300F), ref: 00000001800085B9
        • Part of subcall function 00000001800150D0: OpenProcess.KERNEL32 ref: 000000018001510C
        • Part of subcall function 00000001800150D0: OpenProcess.KERNEL32 ref: 000000018001512C
        • Part of subcall function 00000001800150D0: GetLastError.KERNEL32 ref: 000000018001513E
        • Part of subcall function 00000001800150D0: CloseHandle.KERNEL32 ref: 000000018001542C
        • Part of subcall function 0000000180015470: GetModuleHandleW.KERNEL32 ref: 00000001800154DA
        • Part of subcall function 0000000180015470: GetProcAddress.KERNEL32 ref: 00000001800154EA
      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 0000000180008760
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Process$HandleOpen$AddressCloseCurrentErrorLastModuleProc_invalid_parameter_noinfo_noreturn
      • String ID: Crypto$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\Crypto.cpp$Process did not verify - %x - %u$Process in-memory image did not verify - %u - %s$VerifyProcess failed to get process path - %u$mb::common::crypto::VerifyProcessEx
      • API String ID: 3975211933-3964609968
      • Opcode ID: 8d988610b517b66eb06978deedab6b2115b64aa6f0835ac1fc9e9ed062743cc5
      • Instruction ID: 002036f762da34ff8db0a22a3868040925bfe3c3438f5634a40e792c62256954
      • Opcode Fuzzy Hash: 8d988610b517b66eb06978deedab6b2115b64aa6f0835ac1fc9e9ed062743cc5
      • Instruction Fuzzy Hash: F1511F76608B8982EB51CB54F49439AB7A1F78C7E4F508116FACD47699DF78C648CB00
      APIs
        • Part of subcall function 0000000180106750: AcquireSRWLockExclusive.KERNEL32(?,?,?,00000001800244B1,?,?,?,0000000180002C19), ref: 0000000180106760
      • GetModuleHandleW.KERNEL32 ref: 00000001800154DA
      • GetProcAddress.KERNEL32 ref: 00000001800154EA
        • Part of subcall function 00000001801066E4: AcquireSRWLockExclusive.KERNEL32(?,?,?,00000001800244DB,?,?,?,0000000180002C19), ref: 00000001801066F4
        • Part of subcall function 00000001801066E4: ReleaseSRWLockExclusive.KERNEL32(?,?,?,00000001800244DB,?,?,?,0000000180002C19), ref: 0000000180106734
      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00000001800156EC
      • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00000001800156F2
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ExclusiveLock$Acquire_invalid_parameter_noinfo_noreturn$AddressHandleModuleProcRelease
      • String ID: NtQuerySystemInformation$ntdll.dll
      • API String ID: 2734340950-3774135904
      • Opcode ID: 7b008e91cb76bd202fba05ef95906712dc144a287f15d9e36831c7d287c40dcb
      • Instruction ID: a10bd6991d194b5c177b67f4aac7a101da8466237153ef4756e3699e838ac3bb
      • Opcode Fuzzy Hash: 7b008e91cb76bd202fba05ef95906712dc144a287f15d9e36831c7d287c40dcb
      • Instruction Fuzzy Hash: 0561A272711F48D9FB52DB75D8483DD33A2AB4C7E8F50C225AA980B6E9DE74C689C340
      APIs
      • FreeLibrary.KERNEL32(?,?,0000000180130618,?,?,?,?,00000001801288C5,?,?,?,?,000000018010594C,?,?,00000000), ref: 000000018012FFA0
      • GetProcAddress.KERNEL32(?,?,0000000180130618,?,?,?,?,00000001801288C5,?,?,?,?,000000018010594C,?,?,00000000), ref: 000000018012FFAC
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: AddressFreeLibraryProc
      • String ID: api-ms-$ext-ms-
      • API String ID: 3013587201-537541572
      • Opcode ID: 7198340eb933fcddaf87aa1fa73f54ae1c1aa156182e913faa117afdfadb1161
      • Instruction ID: 03516c87bbbf3b13ccd75a7c17be7f6a40f8331a520ceada4aaaef6bbc0e6d97
      • Opcode Fuzzy Hash: 7198340eb933fcddaf87aa1fa73f54ae1c1aa156182e913faa117afdfadb1161
      • Instruction Fuzzy Hash: 4641D472321B1985FBA7DB1699087E62392B74DBF0F49C129ED0987799EE38C60D8700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Lockitstd::_$Concurrency::cancel_current_taskLockit::_Lockit::~_
      • String ID: bad locale name$false$true
      • API String ID: 2115809835-1062449267
      • Opcode ID: 3eb764857571638ea639fc852bc58915e2b5e0f2f3e3f844ef9de042b42a80e1
      • Instruction ID: 0a47188049085c96de077126a6a7bc261e24a0e280c1158c0fa2977b959a987f
      • Opcode Fuzzy Hash: 3eb764857571638ea639fc852bc58915e2b5e0f2f3e3f844ef9de042b42a80e1
      • Instruction Fuzzy Hash: 0E819032205BC886EB56CF30E8843DE77A4FB98798F549115FA8817B69DF38C699C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: EventReset$Wait$MultipleMutexObjectObjectsReleaseSinglestd::bad_exception::bad_exception
      • String ID: cannot lock reader/writer lock
      • API String ID: 2438275785-3465051855
      • Opcode ID: da3257100d4325e52a0612eeb12e31ec67f956241cd1235f159f0b4ad8865caf
      • Instruction ID: 928cd7e5a2a3c19c91096689682fe9f00081523089b4839ba0cf6de9e0aa202b
      • Opcode Fuzzy Hash: da3257100d4325e52a0612eeb12e31ec67f956241cd1235f159f0b4ad8865caf
      • Instruction Fuzzy Hash: D0115172220A0D92EB92DF20E8947D97371F798F98F808021EA5D436AADF38C64DC740
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ByteCharMultiStringWide
      • String ID:
      • API String ID: 2829165498-0
      • Opcode ID: 2059b5de93772b6589164b545c0d660cdabe6dbd7163e6b83504d15557ee1706
      • Instruction ID: a9fb6d0c5e32a15882cdf7d6f766ac3614fca2e62d703d427023a8a9716f6c71
      • Opcode Fuzzy Hash: 2059b5de93772b6589164b545c0d660cdabe6dbd7163e6b83504d15557ee1706
      • Instruction Fuzzy Hash: B681C572300B4886EBA1CF11E4583A977E1F788BF8F548215EA9957BE8DF7CC6098700
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
      • String ID:
      • API String ID: 2081738530-0
      • Opcode ID: e74defd6e44153776dcf575d9a0119c280fa8a440b153087fd78519c6dbb8ca4
      • Instruction ID: a17a6a9c76327ac1197ff84e204077398036305ebdd83819081fcd8ba0eb649b
      • Opcode Fuzzy Hash: e74defd6e44153776dcf575d9a0119c280fa8a440b153087fd78519c6dbb8ca4
      • Instruction Fuzzy Hash: 7F315432305B4885EBA6DF15E8443DA73A2F79DBE4F488221EA8D577A5DF38C649C700
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
      • String ID:
      • API String ID: 2081738530-0
      • Opcode ID: 2742c7814c3d9141867964d29c3211bf07c947db12c32302beb503fc19865477
      • Instruction ID: c59888543ef58e5a734107e20c96db3b83024bccbeb0ae9d9f276c0960d4cf20
      • Opcode Fuzzy Hash: 2742c7814c3d9141867964d29c3211bf07c947db12c32302beb503fc19865477
      • Instruction Fuzzy Hash: 7E317E32200B4884EBA6DB15E4443DA73A2F74DBE4F58C621EA9D173A6DE78C649C300
      APIs
      • GetLastError.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012AC37
      • FlsSetValue.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012AC6D
      • FlsSetValue.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012AC9A
      • FlsSetValue.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012ACAB
      • FlsSetValue.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012ACBC
      • SetLastError.KERNEL32(?,?,8000000000000000,0000000180124C05,?,?,?,?,000000018012C6C4), ref: 000000018012ACD7
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Value$ErrorLast
      • String ID:
      • API String ID: 2506987500-0
      • Opcode ID: 82dcef6f6a0cd53a4586de6cfa2a6e90bb4c4849da3c8449c30497d264cdbb86
      • Instruction ID: d213d25cf1d276d5630f7abeba5ae812c027ebe3f7d0956fbb059bd98219fbf6
      • Opcode Fuzzy Hash: 82dcef6f6a0cd53a4586de6cfa2a6e90bb4c4849da3c8449c30497d264cdbb86
      • Instruction Fuzzy Hash: 66116D7020164C47FADBE7A1699D3EA63825B8CBF0F94C724A937477D6EE28C6194300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
      • String ID: string too long
      • API String ID: 3936042273-2556327735
      • Opcode ID: a2f15db28bc96a0d3fe94e1749557d9fb73bed376aeb445b49e40e8c97343fc8
      • Instruction ID: f6307991c770a111e731ac363c3614bd6e4c1c5c81b05f7b3cc911774e9de69b
      • Opcode Fuzzy Hash: a2f15db28bc96a0d3fe94e1749557d9fb73bed376aeb445b49e40e8c97343fc8
      • Instruction Fuzzy Hash: 1721C6B1711A4881EE8AE725D4493ED32929B4CBF5F90CA11E66D077D1DE29C6998300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: EventMultipleMutexObjectsReleaseResetWaitstd::bad_exception::bad_exception
      • String ID: cannot lock reader/writer lock
      • API String ID: 2739960895-3465051855
      • Opcode ID: 1af4f7dfb9ebc9c0bdea181eb432d002f952579437f4c92c9cbce27466e656b0
      • Instruction ID: 10f920412d7c47fb8d58a7fe2a1a522ce3c77fd6108f22b1ef94d16f7f12780f
      • Opcode Fuzzy Hash: 1af4f7dfb9ebc9c0bdea181eb432d002f952579437f4c92c9cbce27466e656b0
      • Instruction Fuzzy Hash: 64015272324E4D92EBA1DF14E8947D96361F798BA8F908111EA9D436A9DF68C74CC700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Event$ObjectSingleWaitstd::bad_exception::bad_exception
      • String ID: cannot unlock reader/writer lock
      • API String ID: 3180635873-371100150
      • Opcode ID: 8c42cc83d1dc5662322d6a4df776fd4029acb352a784f7d713df5e6f3d36fb27
      • Instruction ID: d7938ff99a365b3d87c448e0d198d97c5280b858174ccc0be31b4ddeb6fe8eec
      • Opcode Fuzzy Hash: 8c42cc83d1dc5662322d6a4df776fd4029acb352a784f7d713df5e6f3d36fb27
      • Instruction Fuzzy Hash: 53017172210A0D92EB92DF34D8943D92361F798BA8F508221A69D471B6DF38CB4DC740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
      • API String ID: 1646373207-4044117955
      • Opcode ID: 89e552c4e88594f4528d331deacfdfd5774308e9a2a5faa3174df9f7c776611f
      • Instruction ID: 82d929f7dce70f2d4cc30c438cf3b185241df2672d86fdfca1400b9e468a4217
      • Opcode Fuzzy Hash: 89e552c4e88594f4528d331deacfdfd5774308e9a2a5faa3174df9f7c776611f
      • Instruction Fuzzy Hash: A8D0E274610E09D0EB868B11E8983D86322AB1DBA0F858021891906231AE78C78EC300
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: 4c0fcecc25532a6bca2445fc70d44c848c979418bf5aad8969812cd20ace7fdb
      • Instruction ID: bf21a2e4e3eed7cd890d8279d15e8f828ffcafd917cef997570f9cfaa1a5c951
      • Opcode Fuzzy Hash: 4c0fcecc25532a6bca2445fc70d44c848c979418bf5aad8969812cd20ace7fdb
      • Instruction Fuzzy Hash: 7481F732204A8C89F6F78B74A4583EAA790AB5D7B4F06C711FE56265A4DF3CC7898700
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: 875aa39bdbfff885f1eaa1d50411e9c2b76fb06a4bc3d51bafdc59c774b2410f
      • Instruction ID: 12bd030bb14459057d4e795199f88650652e390fad2f0e14d604fef560c65bce
      • Opcode Fuzzy Hash: 875aa39bdbfff885f1eaa1d50411e9c2b76fb06a4bc3d51bafdc59c774b2410f
      • Instruction Fuzzy Hash: 6B11A932A14A0D09F7E61168F84F3E653426B5C370F1BC63CEA764A2DA8F1CCB494318
      APIs
      • FlsGetValue.KERNEL32(?,?,?,0000000180115D4F,?,?,00000000,0000000180115FEA,?,?,?,?,8000000000000000,0000000180115F76), ref: 000000018012AD0F
      • FlsSetValue.KERNEL32(?,?,?,0000000180115D4F,?,?,00000000,0000000180115FEA,?,?,?,?,8000000000000000,0000000180115F76), ref: 000000018012AD2E
      • FlsSetValue.KERNEL32(?,?,?,0000000180115D4F,?,?,00000000,0000000180115FEA,?,?,?,?,8000000000000000,0000000180115F76), ref: 000000018012AD56
      • FlsSetValue.KERNEL32(?,?,?,0000000180115D4F,?,?,00000000,0000000180115FEA,?,?,?,?,8000000000000000,0000000180115F76), ref: 000000018012AD67
      • FlsSetValue.KERNEL32(?,?,?,0000000180115D4F,?,?,00000000,0000000180115FEA,?,?,?,?,8000000000000000,0000000180115F76), ref: 000000018012AD78
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Value
      • String ID:
      • API String ID: 3702945584-0
      • Opcode ID: 4393a27b5c4b3db8017f8f650ba8dda9aa2dc6ef0d4ad1d395ec6791fb07ea56
      • Instruction ID: 5395f719372555535939784c7be95c2335b10427f043919dc8125f3aba7b9476
      • Opcode Fuzzy Hash: 4393a27b5c4b3db8017f8f650ba8dda9aa2dc6ef0d4ad1d395ec6791fb07ea56
      • Instruction Fuzzy Hash: D41166B070060C42FADBD7A5699D3E963825B4C7F1F84C724A93A46BD6ED28D6094300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: NULL$UNKNOWN
      • API String ID: 3668304517-1702702805
      • Opcode ID: 5a53d26a1a5bbb904569064fe1efa1fe02fcc7a8f52a4aaa2ae3858da6874c8a
      • Instruction ID: 72e003983931457cbed81e393341778105e41611213a4bd58213932db65429f8
      • Opcode Fuzzy Hash: 5a53d26a1a5bbb904569064fe1efa1fe02fcc7a8f52a4aaa2ae3858da6874c8a
      • Instruction Fuzzy Hash: 52E1DBB2700A4886EB45DF65D4843DE73A2F389BD8F408112EE5C47BA9DF78C699C780
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: CountLocalTickTime_invalid_parameter_noinfo_noreturn
      • String ID: NULL
      • API String ID: 2617042107-324932091
      • Opcode ID: a28921490d57aeb845739df719c729e3a787046ccc08f6e18cbdcb93d3b3afc5
      • Instruction ID: 0302fca370165518a614849ae6957893dbb9724cfd82eb150d4bd385d77409e6
      • Opcode Fuzzy Hash: a28921490d57aeb845739df719c729e3a787046ccc08f6e18cbdcb93d3b3afc5
      • Instruction Fuzzy Hash: DF819272618B8885D751DF66A4443AAB7A1F7C9BE0F508215FED843B99DF7CC189CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: \\?\
      • API String ID: 3668304517-4282027825
      • Opcode ID: 7474011f91476d4f1f395424f9e6538de8aded65c8bbec649ce6fef0c6d9fbb7
      • Instruction ID: e3da2e98e83031a46e163e82dd4a2df939d91234efc63fa8098c881fd51fdd5e
      • Opcode Fuzzy Hash: 7474011f91476d4f1f395424f9e6538de8aded65c8bbec649ce6fef0c6d9fbb7
      • Instruction Fuzzy Hash: 5571B172F10B8895FB42DBB4D4053EC2362A7997E8F40D712AE5C26ADADE74D299C340
      APIs
      Strings
      • Could not load '%s' function ptr from DLL, %s, xrefs: 0000000180007FF0
      • D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp, xrefs: 000000018000800F
      • mb::common::system::DynamicLibrary::GetFunctionAddress, xrefs: 0000000180008016
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$AddressProc
      • String ID: Could not load '%s' function ptr from DLL, %s$D:\Jenkins\workspace\N_MBCommon-vs2022\src\mbcommon\DynamicLibrary.cpp$mb::common::system::DynamicLibrary::GetFunctionAddress
      • API String ID: 1230731272-4139386056
      • Opcode ID: b34e889fd022bbeee9e1fa76f47b9e9ad2bafbb3a5cc8b6230be30ab7d054667
      • Instruction ID: 8f446e428537b61bb469f5dc6ffa7d697688d599811667f0c1dc1d600c907061
      • Opcode Fuzzy Hash: b34e889fd022bbeee9e1fa76f47b9e9ad2bafbb3a5cc8b6230be30ab7d054667
      • Instruction Fuzzy Hash: EF617C72B11B8495EB91CB69D4543ED33A1FB487E8F40D611EEAC17AA9DF39C689C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Lockitstd::_$GetctypeLockit::_Lockit::~_
      • String ID: bad locale name
      • API String ID: 4031452535-1405518554
      • Opcode ID: 478bf454d2c5dc8698a69319a5ae243412ac62571b83a77d00aeeb4afc9df37b
      • Instruction ID: e46e7240f11e8861bd97b3fc796cf63e4a9d5239baa8a6bc634fefc30cdde4d8
      • Opcode Fuzzy Hash: 478bf454d2c5dc8698a69319a5ae243412ac62571b83a77d00aeeb4afc9df37b
      • Instruction Fuzzy Hash: A751AD32705B888AFB92DB70D4903ED33B0FB48798F448125EE8927A56DF34C25AD740
      APIs
      Strings
      • D:\Jenkins\workspace\N_Poco-VS2022\poco-1.12.4\Foundation\src\UUID.cpp, xrefs: 00000001800053D3
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
      • String ID: D:\Jenkins\workspace\N_Poco-VS2022\poco-1.12.4\Foundation\src\UUID.cpp
      • API String ID: 3936042273-2945662684
      • Opcode ID: 5e185dececa9ffba5f991f3b2136fd39395a2c4a35c5d19d9c8cad2849e43297
      • Instruction ID: 184b889ee7b8437c24e17c986fc0991f08bc74d679e07afdf23ead7db32f2553
      • Opcode Fuzzy Hash: 5e185dececa9ffba5f991f3b2136fd39395a2c4a35c5d19d9c8cad2849e43297
      • Instruction Fuzzy Hash: 6B41F77270174C85FA56DB25A4043ED3291970DBEAF648720EEAD077D2EF79C6D98340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: EventObjectResetSingleWaitstd::bad_exception::bad_exception
      • String ID: cannot lock reader/writer lock
      • API String ID: 2155282129-3465051855
      • Opcode ID: 04afe7aeb50be484474440e41a6ba2e6a53ef334bd5f62e7df4d7ad6249427b5
      • Instruction ID: 957882a243363fd6d7becb3249b184c5a90b221fcb011ca086b4eca50b7a50e4
      • Opcode Fuzzy Hash: 04afe7aeb50be484474440e41a6ba2e6a53ef334bd5f62e7df4d7ad6249427b5
      • Instruction Fuzzy Hash: F001447221094DD1EB92DF24E8947D96372F798B98F508111EA5D475B6DE2CCB4DC700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: EventObjectSingleWaitstd::bad_exception::bad_exception
      • String ID: cannot lock reader/writer lock
      • API String ID: 2550396280-3465051855
      • Opcode ID: 8668b01ef895fa9c907ac601cdbf758bfc3ef4e0a08812f0761a6ab266ec204c
      • Instruction ID: 81ac2efecde3d820960b4444860f485e3e67599f3676025276b3880028ebf80e
      • Opcode Fuzzy Hash: 8668b01ef895fa9c907ac601cdbf758bfc3ef4e0a08812f0761a6ab266ec204c
      • Instruction Fuzzy Hash: BE01867221494D92EFA2DF34E8543D92361F79CBA8F508211AA5D461E5DF78CB4DC700
      APIs
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID:
      • API String ID: 3668304517-0
      • Opcode ID: b2c45699f4e96eed30ae793f53bffa8189e6b1516e1df3511c241bc08676e161
      • Instruction ID: d3ca66fb5dc8ef5d60f2ba4e6a04f48cd7171f11350cc8f66b5cc806ebf3fdaf
      • Opcode Fuzzy Hash: b2c45699f4e96eed30ae793f53bffa8189e6b1516e1df3511c241bc08676e161
      • Instruction Fuzzy Hash: B7B181B2311A8881EF85CF25D4983ED3366F749FD8F548122EA9D0BB99DF79C5998300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: ActionsShim
      • API String ID: 3668304517-3444104735
      • Opcode ID: 15ef7686102915452db76d5188d50b71f09ce339104a48d757c6c0837b23a0f3
      • Instruction ID: 3e157ecc3d4080ae9d86b064c881996505c3036df48e40823568e20f45b0052f
      • Opcode Fuzzy Hash: 15ef7686102915452db76d5188d50b71f09ce339104a48d757c6c0837b23a0f3
      • Instruction Fuzzy Hash: DE916B32210B8482EB85DF25E48439D73A5F789B94F54C125EB9D07BA9DF38C599D340
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID: ActionsShim$cannot create reader/writer lock
      • API String ID: 0-3821395182
      • Opcode ID: 90af42576f8b9e88bc76497404a4c90f79e3ff7b36981b2cb9481b3ad311e525
      • Instruction ID: 5362194995dedf51be220ecf943bbbeff3c2103531289cc3d0a6ebdf7eb1c8fc
      • Opcode Fuzzy Hash: 90af42576f8b9e88bc76497404a4c90f79e3ff7b36981b2cb9481b3ad311e525
      • Instruction Fuzzy Hash: 23414B32210B8881E795DB26E48439E7365F789BD4F54C125EE9D07BA5DF39CA99C300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: Lockitstd::_$Lockit::_Lockit::~_
      • String ID: bad locale name
      • API String ID: 593203224-1405518554
      • Opcode ID: 0a75c369d1590a7b9cdad47024db5ca3613b4c240e337ec2adf62f0efd43d4b2
      • Instruction ID: 3bfe555c786686dd313cd11618e8808d576bb14b31471c45e6f1dc0ab111c233
      • Opcode Fuzzy Hash: 0a75c369d1590a7b9cdad47024db5ca3613b4c240e337ec2adf62f0efd43d4b2
      • Instruction Fuzzy Hash: 8F413D32702B88C9FB96DFB0D4947ED33A4EB48758F448425EE4927A5ACF34C62AD344
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: D:\Jenkins\workspace\N_Poco-VS2022\poco-1.12.4\Foundation\src\UUID.cpp$uuid
      • API String ID: 3668304517-2288208422
      • Opcode ID: 25911d32c636301b8ceb874fa757822df2c01a8879f203403be8eb1c072caf74
      • Instruction ID: 3d5646af06f48f4ead0dfc35d341a1075a49795fa3766d4bc0825e9f98b57a39
      • Opcode Fuzzy Hash: 25911d32c636301b8ceb874fa757822df2c01a8879f203403be8eb1c072caf74
      • Instruction Fuzzy Hash: 8111E5B1A10A8C41EE93D72594463ED5322BB9D7F4F51E311F9BD026E69F68C38D8300
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo_noreturn
      • String ID: ios_base::failbit set$vector too long
      • API String ID: 3668304517-3964744372
      • Opcode ID: 81fac164eb8069a64abdcd1d1755faf9489d3efc6c2a7fce3fddaad9cab7cb75
      • Instruction ID: 5d250b1aaa5fc9c5f3c4f56a8d0ffd0adc0d6c55e903586678183011968d96e5
      • Opcode Fuzzy Hash: 81fac164eb8069a64abdcd1d1755faf9489d3efc6c2a7fce3fddaad9cab7cb75
      • Instruction Fuzzy Hash: FFF0B471312A4885EF8ADF75D4583ED3291AB0CF94F548421EA8C46645DF28C6A88300
      APIs
      • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00000001801052A2), ref: 0000000180108FF8
      • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00000001801052A2), ref: 0000000180109039
      Strings
      Memory Dump Source
      • Source File: 00000005.00000002.3566694341.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
      • Associated: 00000005.00000002.3566630542.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180145000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3566880652.0000000180154000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567044026.00000001801FF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567069829.0000000180200000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567110173.0000000180201000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567151440.0000000180202000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567190203.0000000180203000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567220153.0000000180207000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000005.00000002.3567261790.0000000180209000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_5_2_180000000_rundll32.jbxd
      Similarity
      • API ID: ExceptionFileHeaderRaise
      • String ID: csm
      • API String ID: 2573137834-1018135373
      • Opcode ID: 8ec78f723e8811bbb8f7cc3519f6b9e5d1aa5e1655d1be73bc864709e2988a38
      • Instruction ID: f49007e085962bb718d790a48bb9d5fc839186ba87080fc6a7ab3081cfab14e1
      • Opcode Fuzzy Hash: 8ec78f723e8811bbb8f7cc3519f6b9e5d1aa5e1655d1be73bc864709e2988a38
      • Instruction Fuzzy Hash: A311FB32215B8482EBA2CB25E44439977E5FB8CBA4F598225EACD07769DF38C655CB00
      Strings
      Memory Dump Source
      • Source File: 00000008.00000003.1815330223.00000251C5690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000251C5690000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_3_251c5690000_rundll32.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID: 0-3916222277
      • Opcode ID: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
      • Instruction ID: 13c3180c763b1284b0e3b388b0d4893b9b949bbd0f4c76241e1b29e0b271a505
      • Opcode Fuzzy Hash: e1b5f217ab961a454b36722efd1ce63e8d0791c74eab14a614d4f9e3fc2a9a33
      • Instruction Fuzzy Hash: 88B1953161CE088FEB54EF1CD889BAAB7E1FB98311F41466EE459C7251DB34E845CB82
      APIs
      Memory Dump Source
      • Source File: 00000008.00000003.1815330223.00000251C5690000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000251C5690000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_8_3_251c5690000_rundll32.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: dda5bd23e4ac47bd42f6dd929fb15fd9a0e68714a6453c9134859c40f5c4eed3
      • Instruction ID: 79dee09011304809d3e763a52382fb4d6bf9b74cd0b0d3c14a430d117e8b08f5
      • Opcode Fuzzy Hash: dda5bd23e4ac47bd42f6dd929fb15fd9a0e68714a6453c9134859c40f5c4eed3
      • Instruction Fuzzy Hash: DF017D30A89D3A0BF7D8A76D6CC8B6276C1F7AA306F554056D80AC7246C836DCD1C381