Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PhysXCooking64.dll.dll

Overview

General Information

Sample name:PhysXCooking64.dll.dll
renamed because original name is a hash value
Original sample name:PhysXCooking64.dll.exe
Analysis ID:1547885
MD5:877c8b214d984656143d7576f832d935
SHA1:26bedae9e05afbff75ede2efc7777a376e362b6a
SHA256:28f5e949ecad3606c430cea5a34d0f3e7218f239bcfa758a834dceb649e78abc
Tags:exeLUNARSPIDERuser-JAMESWT_MHT
Infos:

Detection

Bazar Loader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Bazar Loader
Contains functionality to inject threads in other processes
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7252 cmdline: loaddll64.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7304 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7328 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7312 cmdline: rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCloseCooking MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7388 cmdline: rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookClothMesh MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7424 cmdline: rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookConvexMesh MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7452 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCloseCooking MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7460 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookClothMesh MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7476 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookConvexMesh MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7492 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7520 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReportCooking MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7540 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReleasePMap MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7784 cmdline: C:\Windows\system32\WerFault.exe -u -p 7540 -s 332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7548 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxInitCooking MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7776 cmdline: C:\Windows\system32\WerFault.exe -u -p 7556 -s 332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7564 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",GetDeepDVCState MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7576 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7584 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCreatePMap MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7604 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookTriangleMesh MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7620 cmdline: rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookSoftBodyMesh MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
    00000010.00000002.3522296850.000002C0CE150000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
      00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        Process Memory Space: rundll32.exe PID: 7564JoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          SourceRuleDescriptionAuthorStrings
          16.2.rundll32.exe.2c0ce150000.3.raw.unpackJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
            16.2.rundll32.exe.2c0cf990000.5.raw.unpackJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
              16.2.rundll32.exe.2c0cf990000.5.unpackJoeSecurity_Bazar_2Yara detected Bazar LoaderJoe Security
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-03T10:13:59.598872+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449792TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: PhysXCooking64.dll.dllAvira: detected
                Source: PhysXCooking64.dll.dllReversingLabs: Detection: 65%
                Source: Binary string: kernel32.pdbUGP source: rundll32.exe, 00000010.00000003.1778372338.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: kernelbase.pdbUGP source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ntdll.pdb source: rundll32.exe, 00000010.00000003.1765060404.000002C0CFB1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: kernel32.pdb source: rundll32.exe, 00000010.00000003.1778372338.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000010.00000003.1765060404.000002C0CFB1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: E:\w\328b3cc762394cc5\sw\physx\PhysXSDK\2.8.3\RELEASE\bin\win64\PhysXCooking64.pdb source: rundll32.exe, 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.3521810110.000000018004E000.00000002.00000001.01000000.00000003.sdmp, PhysXCooking64.dll.dll
                Source: Binary string: kernelbase.pdb source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp

                Networking

                barindex
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 82.115.223.39 8041Jump to behavior
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 80.78.24.30 8041Jump to behavior
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49755
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49758
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49818
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49839
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49878
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49905
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50016
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50027
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50033
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50055
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50057
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50063
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50064
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50069
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50070
                Source: global trafficTCP traffic: 192.168.2.4:49734 -> 82.115.223.39:8041
                Source: global trafficTCP traffic: 192.168.2.4:49754 -> 80.78.24.30:8041
                Source: Joe Sandbox ViewIP Address: 82.115.223.39 82.115.223.39
                Source: Joe Sandbox ViewIP Address: 80.78.24.30 80.78.24.30
                Source: Joe Sandbox ViewIP Address: 80.78.24.30 80.78.24.30
                Source: Joe Sandbox ViewASN Name: MIDNET-ASTK-TelecomRU MIDNET-ASTK-TelecomRU
                Source: Joe Sandbox ViewASN Name: CYBERDYNELR CYBERDYNELR
                Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49792
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: greshunka.com
                Source: global trafficDNS traffic detected: DNS query: tiguanin.com
                Source: global trafficDNS traffic detected: DNS query: bazarunet.com
                Source: Amcache.hve.24.drString found in binary or memory: http://upx.sf.net
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com/
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com/=V
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/)V
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/-
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/EV%
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/IV)
                Source: rundll32.exe, 00000010.00000003.2835381414.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2557004600.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2802742724.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3083473122.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3060518341.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2664944924.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2791767449.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3093867812.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2741313698.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2567784185.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3028538370.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2588014378.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/admin.php
                Source: rundll32.exe, 00000010.00000002.3522214794.000002C0CDEC8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/bazar.php
                Source: rundll32.exe, 00000010.00000002.3522214794.000002C0CDEC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/bazar.phpf
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/dmin.php
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bazarunet.com:8041/e
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com/
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/%
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/5V
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/MV-
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/U
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/admin.php
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/admin.php=
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2128158286.000002C0CFB48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/bazar.php
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/bazar.phpm
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://greshunka.com:8041/bazar.phppf
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com/
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/
                Source: rundll32.exe, 00000010.00000003.2171584349.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2171985521.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2160623774.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2183097480.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2194230464.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/admin.php
                Source: rundll32.exe, 00000010.00000003.2183097480.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2194230464.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/admin.php.
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/admin.phpB
                Source: rundll32.exe, 00000010.00000003.2390010044.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2400649688.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2515549993.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2431560715.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2492513786.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2504826097.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2545831482.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2420826608.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/bazar.php
                Source: rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tiguanin.com:8041/bazar.phpp
                Source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_31baa8ff-a
                Source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_8de38f74-c
                Source: Yara matchFile source: 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7564, type: MEMORYSTR
                Source: C:\Windows\System32\rundll32.exeCode function: 16_3_000002C0CFA1DA6E NtProtectVirtualMemory,16_3_000002C0CFA1DA6E
                Source: C:\Windows\System32\rundll32.exeCode function: 16_3_000002C0CFA1D98E NtAllocateVirtualMemory,16_3_000002C0CFA1D98E
                Source: C:\Windows\System32\rundll32.exeCode function: 16_3_000002C0CFA1D9FE NtOpenFile,16_3_000002C0CFA1D9FE
                Source: C:\Windows\System32\rundll32.exeCode function: 16_3_000002C0CFA1DACE NtReadFile,16_3_000002C0CFA1DACE
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003E80413_2_000000018003E804
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018002901013_2_0000000180029010
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004B82013_2_000000018004B820
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004104413_2_0000000180041044
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003A05013_2_000000018003A050
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018001788013_2_0000000180017880
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004C08413_2_000000018004C084
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003616013_2_0000000180036160
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004D17813_2_000000018004D178
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004928013_2_0000000180049280
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018002A29013_2_000000018002A290
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180041BE413_2_0000000180041BE4
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180012C0013_2_0000000180012C00
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018000B46013_2_000000018000B460
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004AC9C13_2_000000018004AC9C
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018001D4D013_2_000000018001D4D0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018002C4F013_2_000000018002C4F0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018001754013_2_0000000180017540
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004354813_2_0000000180043548
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018001855013_2_0000000180018550
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004058013_2_0000000180040580
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018000BDA013_2_000000018000BDA0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018000A60013_2_000000018000A600
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180007E5013_2_0000000180007E50
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004868413_2_0000000180048684
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003BEB013_2_000000018003BEB0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180038EF013_2_0000000180038EF0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018002BF2013_2_000000018002BF20
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004477413_2_0000000180044774
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018003E80415_2_000000018003E804
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018002901015_2_0000000180029010
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004B82015_2_000000018004B820
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004104415_2_0000000180041044
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018003A05015_2_000000018003A050
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018001788015_2_0000000180017880
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004C08415_2_000000018004C084
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018003616015_2_0000000180036160
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004D17815_2_000000018004D178
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004928015_2_0000000180049280
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018002A29015_2_000000018002A290
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_0000000180041BE415_2_0000000180041BE4
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_0000000180012C0015_2_0000000180012C00
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018000B46015_2_000000018000B460
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004AC9C15_2_000000018004AC9C
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018001D4D015_2_000000018001D4D0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018002C4F015_2_000000018002C4F0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018001754015_2_0000000180017540
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004354815_2_0000000180043548
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018001855015_2_0000000180018550
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004058015_2_0000000180040580
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018000BDA015_2_000000018000BDA0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018000A60015_2_000000018000A600
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_0000000180007E5015_2_0000000180007E50
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004868415_2_0000000180048684
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018003BEB015_2_000000018003BEB0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_0000000180038EF015_2_0000000180038EF0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018002BF2015_2_000000018002BF20
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018004477415_2_0000000180044774
                Source: C:\Windows\System32\rundll32.exeCode function: 16_2_000002C0CF9D31BE16_2_000002C0CF9D31BE
                Source: C:\Windows\System32\rundll32.exeCode function: 16_2_000002C0CF9D29EE16_2_000002C0CF9D29EE
                Source: C:\Windows\System32\rundll32.exeCode function: 16_2_0000000273F807BE16_2_0000000273F807BE
                Source: C:\Windows\System32\rundll32.exeCode function: 16_2_0000000273F7FFEE16_2_0000000273F7FFEE
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7556 -s 332
                Source: PhysXCooking64.dll.dllBinary or memory string: OriginalFilenamePhysXCooking64.dllr) vs PhysXCooking64.dll.dll
                Source: classification engineClassification label: mal88.troj.evad.winDLL@42/9@3/2
                Source: C:\Windows\System32\rundll32.exeMutant created: NULL
                Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7540
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
                Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7556
                Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a6945d60-b55f-4fb5-937b-3b97c1b2c33cJump to behavior
                Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCloseCooking
                Source: PhysXCooking64.dll.dllReversingLabs: Detection: 65%
                Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll"
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCloseCooking
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookClothMesh
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookConvexMesh
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCloseCooking
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookClothMesh
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookConvexMesh
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReportCooking
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReleasePMap
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxInitCooking
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",GetDeepDVCState
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCreatePMap
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookTriangleMesh
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookSoftBodyMesh
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7556 -s 332
                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7540 -s 332
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCloseCookingJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookClothMeshJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookConvexMeshJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCloseCookingJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookClothMeshJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookConvexMeshJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCStateJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCStateJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReportCookingJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReleasePMapJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCStateJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxInitCookingJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",GetDeepDVCStateJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCStateJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCreatePMapJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookTriangleMeshJump to behavior
                Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookSoftBodyMeshJump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: C:\Windows\System32\rundll32.exeAutomated click: OK
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: PhysXCooking64.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
                Source: PhysXCooking64.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: kernel32.pdbUGP source: rundll32.exe, 00000010.00000003.1778372338.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: kernelbase.pdbUGP source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ntdll.pdb source: rundll32.exe, 00000010.00000003.1765060404.000002C0CFB1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: kernel32.pdb source: rundll32.exe, 00000010.00000003.1778372338.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ntdll.pdbUGP source: rundll32.exe, 00000010.00000003.1765060404.000002C0CFB1A000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: E:\w\328b3cc762394cc5\sw\physx\PhysXSDK\2.8.3\RELEASE\bin\win64\PhysXCooking64.pdb source: rundll32.exe, 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.3521810110.000000018004E000.00000002.00000001.01000000.00000003.sdmp, PhysXCooking64.dll.dll
                Source: Binary string: kernelbase.pdb source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180046A88 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,13_2_0000000180046A88
                Source: PhysXCooking64.dll.dllStatic PE information: real checksum: 0x6c167 should be: 0xb2c0a
                Source: PhysXCooking64.dll.dllStatic PE information: section name: text
                Source: C:\Windows\System32\rundll32.exeCode function: 16_3_000002C0CF9E00D8 push cs; retf 16_3_000002C0CF9E00FD

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49754
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49755
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49758
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49818
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49839
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49878
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 49905
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50016
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50027
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50033
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50055
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50057
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50063
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50064
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50069
                Source: unknownNetwork traffic detected: HTTP traffic on port 8041 -> 50070
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\rundll32.exeAPI coverage: 0.7 %
                Source: C:\Windows\System32\rundll32.exeAPI coverage: 0.7 %
                Source: C:\Windows\System32\loaddll64.exe TID: 7256Thread sleep time: -120000s >= -30000sJump to behavior
                Source: C:\Windows\System32\rundll32.exe TID: 7568Thread sleep time: -120000s >= -30000sJump to behavior
                Source: C:\Windows\System32\rundll32.exe TID: 7568Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Windows\System32\rundll32.exeThread delayed: delay time: 60000Jump to behavior
                Source: Amcache.hve.24.drBinary or memory string: VMware
                Source: Amcache.hve.24.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.24.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.24.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.24.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.24.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.24.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.24.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: rundll32.exe, 00000010.00000002.3522214794.000002C0CDEC8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Amcache.hve.24.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.24.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: Amcache.hve.24.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.24.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.24.drBinary or memory string: vmci.sys
                Source: Amcache.hve.24.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                Source: Amcache.hve.24.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.24.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.24.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                Source: Amcache.hve.24.drBinary or memory string: VMware20,1
                Source: Amcache.hve.24.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.24.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.24.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.24.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.24.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.24.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.24.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.24.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.24.drBinary or memory string: VMware Virtual RAM
                Source: rundll32.exe, 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                Source: Amcache.hve.24.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.24.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_16-2470
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003E5C0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_000000018003E5C0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180046A88 LoadLibraryW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,13_2_0000000180046A88
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004CB30 GetProcessHeap,HeapAlloc,_errno,_errno,__doserrno,_errno,GetProcessHeap,HeapFree,SetEndOfFile,_errno,__doserrno,GetLastError,13_2_000000018004CB30
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018003E5C0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_000000018003E5C0
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180042698 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0000000180042698
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_000000018003E5C0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_000000018003E5C0
                Source: C:\Windows\System32\rundll32.exeCode function: 15_2_0000000180042698 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_0000000180042698

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 82.115.223.39 8041Jump to behavior
                Source: C:\Windows\System32\rundll32.exeNetwork Connect: 80.78.24.30 8041Jump to behavior
                Source: C:\Windows\System32\rundll32.exeCode function: 16_2_0000000273F41380 Sleep,SleepEx,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,16_2_0000000273F41380
                Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7328Jump to behavior
                Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7328Jump to behavior
                Source: C:\Windows\System32\rundll32.exeThread register set: 7328 1Jump to behavior
                Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1Jump to behavior
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_000000018004634C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,13_2_000000018004634C
                Source: C:\Windows\System32\rundll32.exeCode function: 13_2_0000000180040824 HeapCreate,GetVersion,HeapSetInformation,13_2_0000000180040824
                Source: Amcache.hve.24.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.24.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.24.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.24.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0ce150000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0cf990000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0cf990000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3522296850.000002C0CE150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0ce150000.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0cf990000.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 16.2.rundll32.exe.2c0cf990000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.3522296850.000002C0CE150000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                411
                Process Injection
                21
                Virtualization/Sandbox Evasion
                21
                Input Capture
                1
                System Time Discovery
                Remote Services21
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                411
                Process Injection
                LSASS Memory41
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                11
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Obfuscated Files or Information
                Security Account Manager21
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                Rundll32
                NTDS3
                System Information Discovery
                Distributed Component Object ModelInput Capture1
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                PhysXCooking64.dll.dll66%ReversingLabsWin64.Trojan.Maloder
                PhysXCooking64.dll.dll100%AviraTR/AVI.Agent.knniq
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://upx.sf.net0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                greshunka.com
                82.115.223.39
                truetrue
                  unknown
                  tiguanin.com
                  80.78.24.30
                  truetrue
                    unknown
                    bazarunet.com
                    80.78.24.30
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://greshunka.com:8041/admin.php=rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://tiguanin.com:8041/admin.phprundll32.exe, 00000010.00000003.2171584349.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2171985521.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2160623774.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2183097480.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2194230464.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://tiguanin.com:8041/admin.phpBrundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://bazarunet.com/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://greshunka.com:8041/bazar.phpmrundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://tiguanin.com:8041/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://tiguanin.com/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://bazarunet.com:8041/IV)rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      https://greshunka.com:8041/5Vrundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://greshunka.com:8041/bazar.phppfrundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://upx.sf.netAmcache.hve.24.drfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://bazarunet.com:8041/bazar.phpfrundll32.exe, 00000010.00000002.3522214794.000002C0CDEC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            https://tiguanin.com:8041/bazar.phprundll32.exe, 00000010.00000003.2390010044.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2400649688.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2515549993.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2431560715.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2492513786.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2504826097.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2545831482.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2420826608.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              https://greshunka.com:8041/%rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                https://greshunka.com:8041/bazar.phprundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2128158286.000002C0CFB48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://tiguanin.com:8041/bazar.phpprundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://bazarunet.com:8041/bazar.phprundll32.exe, 00000010.00000002.3522214794.000002C0CDEC8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB3C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://bazarunet.com:8041/-rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://bazarunet.com:8041/dmin.phprundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          https://greshunka.com:8041/Urundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            https://tiguanin.com:8041/admin.php.rundll32.exe, 00000010.00000003.2183097480.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2194230464.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://greshunka.com:8041/admin.phprundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://bazarunet.com:8041/)Vrundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://bazarunet.com:8041/EV%rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://greshunka.com:8041/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://bazarunet.com:8041/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://greshunka.com/rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://bazarunet.com:8041/erundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://bazarunet.com:8041/admin.phprundll32.exe, 00000010.00000003.2835381414.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2557004600.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2802742724.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3083473122.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3060518341.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2664944924.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2791767449.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3093867812.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2741313698.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2567784185.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.3028538370.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000003.2588014378.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000010.00000002.3522485761.000002C0CFB49000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://bazarunet.com/=Vrundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://greshunka.com:8041/MV-rundll32.exe, 00000010.00000002.3522485761.000002C0CFB11000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  82.115.223.39
                                                                                  greshunka.comRussian Federation
                                                                                  209821MIDNET-ASTK-TelecomRUtrue
                                                                                  80.78.24.30
                                                                                  tiguanin.comCyprus
                                                                                  37560CYBERDYNELRtrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1547885
                                                                                  Start date and time:2024-11-03 10:12:00 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 6m 30s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Run name:Run with higher sleep bypass
                                                                                  Number of analysed new started processes analysed:30
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:PhysXCooking64.dll.dll
                                                                                  renamed because original name is a hash value
                                                                                  Original Sample Name:PhysXCooking64.dll.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal88.troj.evad.winDLL@42/9@3/2
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 100%
                                                                                  • Number of executed functions: 16
                                                                                  • Number of non-executed functions: 136
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .dll
                                                                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 20.189.173.20, 52.182.143.212
                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • VT rate limit hit for: PhysXCooking64.dll.dll
                                                                                  No simulations
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  82.115.223.39FW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                    Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                      das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                        vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                          Document-18-33-08.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                            Document-19-51-48.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                              vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                dsa.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                  Document-19-27-03.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    80.78.24.30e664858e8b8ff1ac08f6dd812a68d65d05a704262fa13862538c3c45.vbsGet hashmaliciousUnknownBrowse
                                                                                                    • fredlomberhfile.com:2351/lpfdokkq
                                                                                                    s5YgOFFmFK.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • smockalifatori.com/
                                                                                                    CiMXn78mMb.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • skayfingertawr.com/
                                                                                                    Scan_06-28_INV__70.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • hloyagorepa.com/
                                                                                                    Scan_06-28_INV__70.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • hloyagorepa.com/
                                                                                                    Scan_06-28_INV__10.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • hloyagorepa.com/
                                                                                                    Scan_06-28_INV__10.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • hloyagorepa.com/
                                                                                                    05387199.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • shoterqana.com/
                                                                                                    08778399.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • shoterqana.com/
                                                                                                    Contract_March_23_INV#305.exeGet hashmaliciousIcedIDBrowse
                                                                                                    • aoureskindzet.com/
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    bazarunet.comFW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-18-33-08.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-19-51-48.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 185.106.92.54
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 185.106.92.54
                                                                                                    dsa.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 185.106.92.54
                                                                                                    Document-19-27-03.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 185.106.92.54
                                                                                                    tiguanin.comFW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-18-33-08.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 80.78.24.30
                                                                                                    Document-19-51-48.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.40
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.40
                                                                                                    dsa.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.40
                                                                                                    Document-19-27-03.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.40
                                                                                                    greshunka.comFW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                                    • 82.115.223.39
                                                                                                    Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    Document-18-33-08.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    Document-19-51-48.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    vierm_soft_x64.dll.dllGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    dsa.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    Document-19-27-03.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    MIDNET-ASTK-TelecomRUFW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                                    • 82.115.223.39
                                                                                                    Document-19-36-27.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    meliwe_gown_x64.dll.dllGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    Document-19-36-27.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    Document-19-29-20.jsGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    meliwe_gown_x64.dll.dllGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    BEST.msiGet hashmaliciousUnknownBrowse
                                                                                                    • 82.115.223.150
                                                                                                    Document-20-18-07.jsGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    das.msiGet hashmaliciousBazar Loader, BruteRatel, LatrodectusBrowse
                                                                                                    • 82.115.223.39
                                                                                                    CYBERDYNELRFW3x3p4eZ5.msiGet hashmaliciousBazar Loader, BruteRatelBrowse
                                                                                                    • 80.78.24.30
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    na.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                                                    • 185.193.127.129
                                                                                                    No context
                                                                                                    No context
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):65536
                                                                                                    Entropy (8bit):0.7785215270383897
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:2yFiey67xWSy0hXxiPEj5eCzuiFXZ24lO8f2jY:Pijmx9hXxiPEjVzuiFXY4lO8K
                                                                                                    MD5:639ADCD1C83EEAB4ED3A422979C8B8DA
                                                                                                    SHA1:21F62EB232E4407F88920D63E340F5D431CE6C0A
                                                                                                    SHA-256:CCD3EF02B387E94BE42723F97C930B83896E57E9B5C4E68C492EF1065B8E5245
                                                                                                    SHA-512:30F665511C1EEB03CBDCC5C1FC8D976E5984605B470C1AC5932D8659036224B002F03338939DD7D5C145FF196F2CFAA451AF9567667DD4005F65F32691FA37E1
                                                                                                    Malicious:false
                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.0.9.8.7.8.0.7.3.1.5.0.8.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.0.9.8.7.8.1.9.5.0.2.5.8.4.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.b.3.7.b.f.d.3.-.0.a.7.a.-.4.8.5.b.-.b.7.f.0.-.9.c.8.a.e.1.2.c.d.d.8.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.a.8.d.b.2.0.c.-.8.d.4.6.-.4.7.d.e.-.9.b.4.8.-.7.0.2.0.f.c.5.3.4.f.1.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.P.h.y.s.X.C.o.o.k.i.n.g.6.4...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.8.4.-.0.0.0.1.-.0.0.1.4.-.f.f.4.4.-.0.4.9.4.d.0.2.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):65536
                                                                                                    Entropy (8bit):0.7782951515594955
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:3ypFixy6zWS8061DSj5eCzuiFXZ24lO8f2jY:+i0ez61DSjVzuiFXY4lO8K
                                                                                                    MD5:60A21A5318A0EFF168F39E93B40E66AC
                                                                                                    SHA1:0DB8E87417B0FB2D13A12A237EE897E60CA87AED
                                                                                                    SHA-256:BDA87CE84A8EA4B1E36655E36E7C9323463FA909582B14301AC42D943A89BF2A
                                                                                                    SHA-512:4456C4896D9032870EC69EECAE0C5BF6875C1927E085786912EE05C364BE9E1EF3C59E78EACCCF830D865E362FE2230AB1A04AAF58EC4F568494F4D58A8F7E0F
                                                                                                    Malicious:false
                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.0.9.8.7.8.0.7.1.5.7.5.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.0.9.8.7.8.1.9.6.5.6.9.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.c.a.c.1.0.d.6.-.a.9.a.7.-.4.8.e.d.-.b.4.a.5.-.7.f.7.b.4.f.a.a.5.0.5.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.3.4.b.a.9.5.-.1.e.4.e.-.4.f.6.b.-.8.7.7.8.-.c.3.b.9.1.0.2.c.9.c.9.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.P.h.y.s.X.C.o.o.k.i.n.g.6.4...d.l.l...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.7.4.-.0.0.0.1.-.0.0.1.4.-.d.4.0.c.-.f.f.9.3.d.0.2.d.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:Mini DuMP crash report, 14 streams, Sun Nov 3 09:13:01 2024, 0x1205a4 type
                                                                                                    Category:dropped
                                                                                                    Size (bytes):57270
                                                                                                    Entropy (8bit):1.621088240638022
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:AwwtYcfnFqHzTOMpn0g1QBswHN4NE6GTCRjh0rn6F4Mtko:ADycfnWzKQ0PVSNcV69
                                                                                                    MD5:6A7EC4DE807691794D5C508E67BB0038
                                                                                                    SHA1:532FD542C3FBF3B7364C4B28E1235CC3ACAF5202
                                                                                                    SHA-256:F0E4125AF95602451128827607AB16241DC0545686CA7F566427A42A07D664A4
                                                                                                    SHA-512:6E0B381380CFAC1C90E2A8C624B3FC589EE31FBDBEEABAFA516ABB3218DAD49C8A53B3D2DB84305AF5C79EB259CAAC9A296E63A9D349A5302049AC2BC5ECBA99
                                                                                                    Malicious:false
                                                                                                    Preview:MDMP..a..... ........>'g.........................................)..........T.......8...........T...............6...........T...........@...............................................................................eJ..............Lw......................T.......t....>'g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:Mini DuMP crash report, 14 streams, Sun Nov 3 09:13:01 2024, 0x1205a4 type
                                                                                                    Category:dropped
                                                                                                    Size (bytes):55574
                                                                                                    Entropy (8bit):1.6753560949607624
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:AwPKYcfnFq1COMpy4wB5dAJ76QSlwKIlPfNknnnQ11Qavkm:AaNcfnYdP4wPCJErIlPfNknnnQsav
                                                                                                    MD5:015D1069A40FC0142EE6112EF1A1EB33
                                                                                                    SHA1:EE6D0095073DC1CAC6DE8CA50C7E5EFEC666320E
                                                                                                    SHA-256:8AE0DE64A3076CD3146AAE5405B03D6CAC88C30BC008CA623A969B8734306EC6
                                                                                                    SHA-512:8C90D0188B99BB019F28717AE96FF1A9BCA5EF7F7C5A247884FF56A044A78A7C2E1822ECE056EFEB8DD1F27C58D58521DAE82A7015AA72B11C69BEA651DA97F0
                                                                                                    Malicious:false
                                                                                                    Preview:MDMP..a..... ........>'g.........................................)..........T.......8...........T...........................T...........@...............................................................................eJ..............Lw......................T............>'g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8806
                                                                                                    Entropy (8bit):3.7024529850411954
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:R6l7wVeJjnoqK36YDN1dsbgmf4LMrKmprD89bfGbfVq1m:R6lXJDoqK36Yp1KgmfyMG3fifj
                                                                                                    MD5:B8B3B1F88ACAC54994949CBCC4D0613D
                                                                                                    SHA1:356E3261E9C019991A91D7394465B08BCE22F886
                                                                                                    SHA-256:F391F06EC2353207DEB84540EB68F7A74931117FAA6D285B4B9A2C75CEF9B627
                                                                                                    SHA-512:2A5A175F53493EFD97DEB099DC4A13D5A2B6EAED0B09E4E1EBDB2C1B60CC1F5F20BD44F2E4697DDCA608C1BB5C85950088E09FBE531F427C00C3091FE70C4A00
                                                                                                    Malicious:false
                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.4.0.<./.P.i.
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):8806
                                                                                                    Entropy (8bit):3.702786390536748
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:192:R6l7wVeJkqCK16YDs1dsbgmf4LMrQ6prQ89bfHLfJ1m:R6lXJxCK16YI1KgmfyMUSfrfy
                                                                                                    MD5:7E8B81133DFD3BEA9C37150652F40FCC
                                                                                                    SHA1:D4014988ECC8A31FE0EB3F1099F21D284C2A0375
                                                                                                    SHA-256:38D5F43A03564DDBE77668838648004F139EE0A4B5A92BD99370AC102726BCA1
                                                                                                    SHA-512:4BFD2365539D4578F0EC99E3E6B7088E231C32F43F8EF4B2B009F3E621D59A864DC0587B9DDDAC5645506709474D05E2D32D34FADB40216F912331DF108F2D00
                                                                                                    Malicious:false
                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.5.5.6.<./.P.i.
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4796
                                                                                                    Entropy (8bit):4.506478677422847
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:cvIwWl8zsHJg771I9PEWpW8VYUYm8M4JC1ZC1xGUFMjzyq85m1M6xHptSTSzd:uIjfpI7Qd7VQJoOwvjz3M8HpoOzd
                                                                                                    MD5:09B42C9234734DABC4A60E8166D4BB98
                                                                                                    SHA1:2AFD7FC2BDA5738476FCD3D2A34AC64E53041365
                                                                                                    SHA-256:AD7A92B06DFBBAB0C815F26CD9C1CC99342E5E7C1B2A17A8CE178668E10E4C9F
                                                                                                    SHA-512:D22BD01E7A2B6B11783293B13135FFA1258D983EC9B6ED55C3F58D21405259611969F4AE970CCE52E544DB240389C8883584FEE2520AB02FA96EC6952FE97E03
                                                                                                    Malicious:false
                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="571695" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                    Category:dropped
                                                                                                    Size (bytes):4796
                                                                                                    Entropy (8bit):4.505688127374432
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:48:cvIwWl8zsHJg771I9PEWpW8VYhYm8M4JC1ZC1xGiF1yq85m1M6SptSTSBd:uIjfpI7Qd7VNJoOw63MNpoOBd
                                                                                                    MD5:838D9DBC2FB37E5A0CFD5E39C05A12C2
                                                                                                    SHA1:CC6C55C950D39959A1BAFAF1E4407C4DF237DC41
                                                                                                    SHA-256:7DA49A9207144373F608EEDB8396DAF889589597C2057DFFA5CA61CDC44E0DED
                                                                                                    SHA-512:3374734D8E4AD42972D8B5B0511A2261F240A7ECB49D5CA72970691251A3116DF4F8DCE774CB31A35D96F920B184B302491CE92946485B39B5AF333AF21D1F51
                                                                                                    Malicious:false
                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="571695" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                    Process:C:\Windows\System32\WerFault.exe
                                                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                                                    Category:dropped
                                                                                                    Size (bytes):1835008
                                                                                                    Entropy (8bit):4.4663864540877585
                                                                                                    Encrypted:false
                                                                                                    SSDEEP:6144:xIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:SXD94zWlLZMM6YFHa+9
                                                                                                    MD5:B2DDD9DE53CAB6F49DEEA330E6236A5E
                                                                                                    SHA1:1F9D2B970BD1A4A5BA7521F839F52407DD6A3CCB
                                                                                                    SHA-256:9BCCEE052BABA4E930038B14622AF95B39330CD1C280A55C2E098FC82987AF38
                                                                                                    SHA-512:D3AD08339ADB8CBC1FB59BD8149ABB05AB6C8F058A1F0F3A9A484DF19E0F177B1C69F5D3E5DE7044DAC13EA857501F92777A82497E9053E742E2AB9835EF7D88
                                                                                                    Malicious:false
                                                                                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm^.w..-..............................................................................................................................................................................................................................................................................................................................................(.`.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                    File type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                    Entropy (8bit):7.329646601975181
                                                                                                    TrID:
                                                                                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                                                                                    • Win64 Executable (generic) (12005/4) 10.17%
                                                                                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                                                                                    • DOS Executable Generic (2002/1) 1.70%
                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                                                                                    File name:PhysXCooking64.dll.dll
                                                                                                    File size:682'496 bytes
                                                                                                    MD5:877c8b214d984656143d7576f832d935
                                                                                                    SHA1:26bedae9e05afbff75ede2efc7777a376e362b6a
                                                                                                    SHA256:28f5e949ecad3606c430cea5a34d0f3e7218f239bcfa758a834dceb649e78abc
                                                                                                    SHA512:f07ac6795f4d8de38ac7f92a5ae308d2bdc30e29cebdf93b7fdee958c04bb83b1a28c4e6ac4e6a770b6d207af2a886cc93028b26e8850327f55391118f2d621a
                                                                                                    SSDEEP:12288:c91cnMmvhqG3zx+zd/RMzDWrii7x4if+H3fFBI:c91cMmvhHzx+z5qW7qiMFe
                                                                                                    TLSH:5BE4BF02F67684E4F0AB903C996BF157EA71348807318ADF43D19A296F23BD05D7B366
                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......W.p..............4.......4..................z....4..e....4.......4.......4......Rich............PE..d......`..........# .......
                                                                                                    Icon Hash:7ae282899bbab082
                                                                                                    Entrypoint:0x180040170
                                                                                                    Entrypoint Section:.text
                                                                                                    Digitally signed:true
                                                                                                    Imagebase:0x180000000
                                                                                                    Subsystem:windows cui
                                                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                                                                                    DLL Characteristics:NX_COMPAT
                                                                                                    Time Stamp:0x60ED99AC [Tue Jul 13 13:48:28 2021 UTC]
                                                                                                    TLS Callbacks:
                                                                                                    CLR (.Net) Version:
                                                                                                    OS Version Major:5
                                                                                                    OS Version Minor:2
                                                                                                    File Version Major:5
                                                                                                    File Version Minor:2
                                                                                                    Subsystem Version Major:5
                                                                                                    Subsystem Version Minor:2
                                                                                                    Import Hash:fc95d9602c39b01774b1f9a2b19b1e87
                                                                                                    Signature Valid:
                                                                                                    Signature Issuer:
                                                                                                    Signature Validation Error:
                                                                                                    Error Number:
                                                                                                    Not Before, Not After
                                                                                                      Subject Chain
                                                                                                        Version:
                                                                                                        Thumbprint MD5:
                                                                                                        Thumbprint SHA-1:
                                                                                                        Thumbprint SHA-256:
                                                                                                        Serial:
                                                                                                        Instruction
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp+08h], ebx
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp+10h], esi
                                                                                                        push edi
                                                                                                        dec eax
                                                                                                        sub esp, 20h
                                                                                                        dec ecx
                                                                                                        mov edi, eax
                                                                                                        mov ebx, edx
                                                                                                        dec eax
                                                                                                        mov esi, ecx
                                                                                                        cmp edx, 01h
                                                                                                        jne 00007F5DCD036927h
                                                                                                        call 00007F5DCD03CAE0h
                                                                                                        dec esp
                                                                                                        mov eax, edi
                                                                                                        mov edx, ebx
                                                                                                        dec eax
                                                                                                        mov ecx, esi
                                                                                                        dec eax
                                                                                                        mov ebx, dword ptr [esp+30h]
                                                                                                        dec eax
                                                                                                        mov esi, dword ptr [esp+38h]
                                                                                                        dec eax
                                                                                                        add esp, 20h
                                                                                                        pop edi
                                                                                                        jmp 00007F5DCD0367CCh
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        inc eax
                                                                                                        push ebx
                                                                                                        dec eax
                                                                                                        sub esp, 20h
                                                                                                        mov ebx, ecx
                                                                                                        dec eax
                                                                                                        lea ecx, dword ptr [00011159h]
                                                                                                        call dword ptr [0000DF13h]
                                                                                                        dec eax
                                                                                                        test eax, eax
                                                                                                        je 00007F5DCD03693Bh
                                                                                                        dec eax
                                                                                                        lea edx, dword ptr [00011137h]
                                                                                                        dec eax
                                                                                                        mov ecx, eax
                                                                                                        call dword ptr [0000DEF6h]
                                                                                                        dec eax
                                                                                                        test eax, eax
                                                                                                        je 00007F5DCD036926h
                                                                                                        mov ecx, ebx
                                                                                                        call eax
                                                                                                        dec eax
                                                                                                        add esp, 20h
                                                                                                        pop ebx
                                                                                                        ret
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        inc eax
                                                                                                        push ebx
                                                                                                        dec eax
                                                                                                        sub esp, 20h
                                                                                                        mov ebx, ecx
                                                                                                        call 00007F5DCD0368DCh
                                                                                                        mov ecx, ebx
                                                                                                        call dword ptr [0000DEDFh]
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        mov ecx, 00000008h
                                                                                                        jmp 00007F5DCD03CD23h
                                                                                                        int3
                                                                                                        int3
                                                                                                        mov ecx, 00000008h
                                                                                                        jmp 00007F5DCD03CC17h
                                                                                                        int3
                                                                                                        int3
                                                                                                        inc eax
                                                                                                        push ebx
                                                                                                        dec eax
                                                                                                        sub esp, 20h
                                                                                                        call 00007F5DCD0398B6h
                                                                                                        dec eax
                                                                                                        mov ecx, eax
                                                                                                        dec eax
                                                                                                        mov ebx, eax
                                                                                                        call 00007F5DCD03705Fh
                                                                                                        dec eax
                                                                                                        mov ecx, ebx
                                                                                                        call 00007F5DCD038D7Bh
                                                                                                        Programming Language:
                                                                                                        • [ C ] VS2010 SP1 build 40219
                                                                                                        • [ASM] VS2010 SP1 build 40219
                                                                                                        • [IMP] VS2008 SP1 build 30729
                                                                                                        • [C++] VS2010 SP1 build 40219
                                                                                                        • [EXP] VS2010 SP1 build 40219
                                                                                                        • [RES] VS2010 SP1 build 40219
                                                                                                        • [LNK] VS2010 SP1 build 40219
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x5b1000x1bd.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x5a8d40x3c.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6a0000x43a40.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x640000x3d20.pdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x632000x2628
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000x6dc.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x4e3500x1c.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x4e0000x2b0.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x4c86e0x4ca00d7ab8f103438629baf74067853cc3d8dFalse0.52311569637031data6.4781719664552275IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x4e0000xd2bd0xd40079625cdc7bc106d71feb5d0087b62080False0.4110038325471698data5.331540967968008IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0x5c0000x7ce00x2400a0436247a7799afacd33f358b02702c7False0.2552083333333333data3.73811941115243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .pdata0x640000x3d200x3e004040bbe8492742335a7a9b04eff60006False0.47026209677419356data5.670603879121688IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        text0x680000xead0x1000704fb2da1d8d8b02229fdcc77b3cde79False0.48876953125data5.534658572431269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE
                                                                                                        data0x690000xb300xc00e67261d4a07a3568d2723c0eabc10fdcFalse0.7652994791666666data6.5387327996115445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x6a0000x43a400x43c00292043c5c2525c2a553ce7ca87edef87False0.9606564229704797data7.98451089709104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0xae0000xc540xe00961a156f322b796ad1c3614cbf30b797False0.26869419642857145data3.613001948133295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_VERSION0x6a0a00x3a0dataEnglishUnited States0.4191810344827586
                                                                                                        RT_HTML0x6a4400x43600data0.9642639726345084
                                                                                                        DLLImport
                                                                                                        KERNEL32.dllInitializeCriticalSection, DeleteCriticalSection, GetCurrentThreadId, EnterCriticalSection, LeaveCriticalSection, CloseHandle, Sleep, QueryPerformanceCounter, CreateFileW, GetProcessHeap, SetEndOfFile, GetStringTypeW, LCMapStringW, WriteConsoleW, CreateFileA, FlushFileBuffers, SetStdHandle, RtlPcToFileHeader, HeapAlloc, GetLastError, HeapFree, HeapReAlloc, DecodePointer, EncodePointer, FlsSetValue, GetCommandLineA, GetProcAddress, GetModuleHandleW, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, HeapSetInformation, GetVersion, HeapCreate, HeapDestroy, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, TerminateProcess, GetCurrentProcess, HeapSize, RtlUnwindEx, FlsGetValue, FlsFree, SetLastError, FlsAlloc, InitializeCriticalSectionAndSpinCount, SetHandleCount, GetFileType, GetStartupInfoW, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, MultiByteToWideChar, ReadFile, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LoadLibraryW, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RaiseException
                                                                                                        WSOCK32.dllsend, WSAGetLastError, recv, htons, gethostbyname, ioctlsocket, gethostbyaddr, socket, connect, closesocket, inet_ntoa, WSAStartup
                                                                                                        NameOrdinalAddress
                                                                                                        NxCloseCooking10x18002f2b0
                                                                                                        NxCookClothMesh20x18002f9e0
                                                                                                        NxCookConvexMesh30x18002f4c0
                                                                                                        NxCookSoftBodyMesh40x18002fb40
                                                                                                        NxCookTriangleMesh50x18002f800
                                                                                                        NxCreatePMap60x18003d0a0
                                                                                                        DetDeepDVCState70x18002f400
                                                                                                        GetDeepDVCState80x18002f0d0
                                                                                                        NxInitCooking90x18002f1a0
                                                                                                        DetDeepDVCState100x18002f0e0
                                                                                                        NxReleasePMap110x18003d1a0
                                                                                                        NxReportCooking120x18002dd60
                                                                                                        DetDeepDVCState130x18002f340
                                                                                                        DetDeepDVCState140x18002f080
                                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                                        EnglishUnited States
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2024-11-03T10:13:59.598872+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449792TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Nov 3, 2024 10:13:06.177438021 CET497348041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:06.182456970 CET80414973482.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:06.182538986 CET497348041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:06.194237947 CET497348041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:06.199224949 CET80414973482.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:13.796787024 CET80414973482.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:13.796878099 CET497348041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:13.824791908 CET497348041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:13.829737902 CET80414973482.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:13.865169048 CET497458041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:13.870212078 CET80414974582.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:13.870305061 CET497458041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:13.872834921 CET497458041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:13.877806902 CET80414974582.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:21.492747068 CET80414974582.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:21.494801998 CET497458041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:21.494802952 CET497458041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:21.496813059 CET497508041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:21.499759912 CET80414974582.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:21.501589060 CET80414975082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:21.501655102 CET497508041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:21.501729965 CET497508041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:21.507006884 CET80414975082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:21.507101059 CET497508041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:22.609426975 CET497518041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:22.614440918 CET80414975182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:22.614552975 CET497518041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:22.618113995 CET497518041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:22.622992992 CET80414975182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:30.228250027 CET80414975182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:30.228456974 CET497518041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:30.230146885 CET497518041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:30.232290030 CET497528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:30.235121965 CET80414975182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:30.237524033 CET80414975282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:30.237601042 CET497528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:30.237864971 CET497528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:30.243196011 CET80414975282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:37.843199015 CET80414975282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:37.843296051 CET497528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:37.843440056 CET497528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:37.847145081 CET497538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:37.848191023 CET80414975282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:37.852643967 CET80414975382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:37.852727890 CET497538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:37.852811098 CET497538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:37.858063936 CET80414975382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:37.858124018 CET497538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:40.017601967 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:40.022524118 CET80414975480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:40.022604942 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:40.022906065 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:40.028564930 CET80414975480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:41.084125042 CET80414975480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:41.084259033 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.090087891 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.095284939 CET80414975480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:41.095340014 CET497548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.096179962 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.101080894 CET80414975580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:41.101157904 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.101490974 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:41.106391907 CET80414975580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.185731888 CET80414975580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.185805082 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.186161041 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.190494061 CET497568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.191384077 CET80414975580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.191431999 CET497558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.195326090 CET80414975680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.195393085 CET497568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.195518017 CET497568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.200643063 CET80414975680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.200691938 CET497568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.237678051 CET497578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.242542982 CET80414975780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:42.242614985 CET497578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.242840052 CET497578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:42.247629881 CET80414975780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:43.337116957 CET80414975780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:43.337315083 CET497578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:43.337349892 CET497578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:43.342153072 CET80414975780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:43.347182989 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:43.352088928 CET80414975880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:43.352174997 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:43.352437973 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:43.357256889 CET80414975880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.415111065 CET80414975880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.415287971 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.415465117 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.419318914 CET497598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.420944929 CET80414975880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.420994997 CET497588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.424235106 CET80414975980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.424298048 CET497598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.424423933 CET497598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.429845095 CET80414975980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.429970980 CET497598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:13:44.462589979 CET497608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:44.467505932 CET80414976082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:44.467581987 CET497608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:44.467978001 CET497608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:44.472917080 CET80414976082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:52.074984074 CET80414976082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:52.075088024 CET497608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:52.075196028 CET497608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:52.079977989 CET80414976082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:52.080704927 CET497678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:52.085489035 CET80414976782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:52.085562944 CET497678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:52.085807085 CET497678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:52.090707064 CET80414976782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:59.691582918 CET80414976782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:59.691729069 CET497678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:59.716253996 CET497678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:59.720233917 CET498038041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:59.721132040 CET80414976782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:59.725090981 CET80414980382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:59.725169897 CET498038041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:59.731208086 CET498038041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:13:59.736205101 CET80414980382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:13:59.736258030 CET498038041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:02.965183020 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:02.970150948 CET80414981880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:02.970237970 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:02.979568005 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:02.985485077 CET80414981880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:04.028563976 CET80414981880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:04.028654099 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.029043913 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.032181978 CET498248041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.034348011 CET80414981880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:04.034405947 CET498188041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.037162066 CET80414982480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:04.037230968 CET498248041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.037458897 CET498248041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:04.042459965 CET80414982480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:05.092539072 CET80414982480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:05.092614889 CET498248041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:05.092696905 CET498248041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:05.096436024 CET498308041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:05.098416090 CET80414982480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:05.101329088 CET80414983080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:05.101394892 CET498308041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:05.101567984 CET498308041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:05.107883930 CET80414983080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:05.107934952 CET498308041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:07.122895002 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:07.129695892 CET80414983980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:07.129802942 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:07.130137920 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:07.136208057 CET80414983980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:08.183645964 CET80414983980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:08.183707952 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.183945894 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.189032078 CET80414983980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:08.189070940 CET498458041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.189083099 CET498398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.193799019 CET80414984580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:08.196820021 CET498458041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.197033882 CET498458041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:08.201781034 CET80414984580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.245697975 CET80414984580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.245755911 CET498458041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:09.245847940 CET498458041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:09.249546051 CET498508041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:09.250610113 CET80414984580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.254643917 CET80414985080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.254707098 CET498508041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:09.254822969 CET498508041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:09.260432959 CET80414985080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.260844946 CET80414985080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:09.260895014 CET498508041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:14.377691984 CET498728041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:14.382519007 CET80414987280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:14.382592916 CET498728041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:14.386059999 CET498728041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:14.390873909 CET80414987280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:15.510170937 CET80414987280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:15.510238886 CET498728041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:15.510334015 CET498728041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:15.513969898 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:15.515523911 CET80414987280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:15.518835068 CET80414987880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:15.518908978 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:15.519187927 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:15.523988008 CET80414987880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:16.578778028 CET80414987880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:16.582382917 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.582689047 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.586318970 CET498848041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.588093042 CET80414987880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:16.589854002 CET498788041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.591236115 CET80414988480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:16.591331005 CET498848041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.591444016 CET498848041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:16.596913099 CET80414988480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:16.596961021 CET498848041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:19.659164906 CET498998041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:19.664264917 CET80414989980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:19.664339066 CET498998041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:19.664586067 CET498998041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:19.669924021 CET80414989980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:20.728019953 CET80414989980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:20.728224993 CET498998041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:20.728246927 CET498998041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:20.733129978 CET80414989980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:20.733678102 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:20.738658905 CET80414990580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:20.738759995 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:20.739063025 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:20.743832111 CET80414990580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:21.805670977 CET80414990580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:21.805804968 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.806184053 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.810348988 CET499118041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.811378956 CET80414990580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:21.811436892 CET499058041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.815258026 CET80414991180.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:21.815345049 CET499118041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.815485001 CET499118041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:21.820743084 CET80414991180.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:21.820799112 CET499118041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:23.840346098 CET499228041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:23.849472046 CET80414992282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:23.849539042 CET499228041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:23.849893093 CET499228041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:23.867897034 CET80414992282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:31.476875067 CET80414992282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:31.477006912 CET499228041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:31.510984898 CET499228041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:31.517714024 CET80414992282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:31.533905029 CET499588041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:31.538849115 CET80414995882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:31.538953066 CET499588041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:31.540831089 CET499588041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:31.545706987 CET80414995882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:39.157473087 CET80414995882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:39.159143925 CET499588041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:39.159841061 CET499588041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:39.163196087 CET499938041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:39.168908119 CET80414995882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:39.173115969 CET80414999382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:39.173198938 CET499938041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:39.173285007 CET499938041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:39.178527117 CET80414999382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:39.178586006 CET499938041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:44.216542006 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:44.221476078 CET80415001680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:44.221564054 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:44.221793890 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:44.226897955 CET80415001680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:45.301837921 CET80415001680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:45.301911116 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.302155972 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.306071997 CET500228041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.307365894 CET80415001680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:45.307425022 CET500168041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.310996056 CET80415002280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:45.311057091 CET500228041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.311256886 CET500228041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:45.316018105 CET80415002280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.366137981 CET80415002280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.366193056 CET500228041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.366288900 CET500228041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.369828939 CET500268041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.371063948 CET80415002280.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.374659061 CET80415002680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.374727011 CET500268041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.375026941 CET500268041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.380274057 CET80415002680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.380317926 CET500268041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.408535004 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.413311005 CET80415002780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:46.413381100 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.413619041 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:46.418375969 CET80415002780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:47.482707024 CET80415002780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:47.482919931 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.507167101 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.511004925 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.512417078 CET80415002780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:47.512468100 CET500278041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.515929937 CET80415003380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:47.516009092 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.517013073 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:47.521778107 CET80415003380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:48.564397097 CET80415003380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:48.564460993 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.565282106 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.570008993 CET500398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.571151018 CET80415003380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:48.571206093 CET500338041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.574978113 CET80415003980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:48.575059891 CET500398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.575268984 CET500398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:48.582062960 CET80415003980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:14:48.582110882 CET500398041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:14:50.627362013 CET500498041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:50.632474899 CET80415004982.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:50.632575989 CET500498041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:50.632925987 CET500498041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:50.637931108 CET80415004982.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:58.244868994 CET80415004982.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:58.245135069 CET500498041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:58.246695995 CET500498041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:58.249159098 CET500528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:58.251744986 CET80415004982.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:58.253974915 CET80415005282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:14:58.254060030 CET500528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:58.254301071 CET500528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:14:58.259392977 CET80415005282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:05.861362934 CET80415005282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:05.861632109 CET500528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:05.861632109 CET500528041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:05.865113020 CET500538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:05.866666079 CET80415005282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:05.870064974 CET80415005382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:05.870132923 CET500538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:05.870234966 CET500538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:05.875449896 CET80415005382.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:05.875502110 CET500538041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:07.891912937 CET500548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:07.896807909 CET80415005480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:07.897001028 CET500548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:07.897329092 CET500548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:07.902090073 CET80415005480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:08.977179050 CET80415005480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:08.977379084 CET500548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:08.977590084 CET500548041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:08.981498957 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:08.982414961 CET80415005480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:08.986385107 CET80415005580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:08.986450911 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:08.986717939 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:08.991520882 CET80415005580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:10.046612024 CET80415005580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:10.046667099 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.047238111 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.050949097 CET500568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.052381039 CET80415005580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:10.052437067 CET500558041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.055752993 CET80415005680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:10.055820942 CET500568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.055955887 CET500568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:10.061007023 CET80415005680.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:10.061049938 CET500568041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:11.089602947 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:11.094554901 CET80415005780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:11.096930981 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:11.097239971 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:11.102024078 CET80415005780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:12.153237104 CET80415005780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:12.153316975 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.255765915 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.261080980 CET80415005780.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:12.261157990 CET500578041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.280498981 CET500588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.285429955 CET80415005880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:12.285527945 CET500588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.285826921 CET500588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:12.291033983 CET80415005880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:13.374806881 CET80415005880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:13.374923944 CET500588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:13.375104904 CET500588041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:13.379874945 CET80415005880.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:13.381939888 CET500598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:13.386744022 CET80415005980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:13.386867046 CET500598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:13.388612986 CET500598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:13.393475056 CET80415005980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:13.393551111 CET500598041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:14.455168009 CET500608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:14.461551905 CET80415006082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:14.461668968 CET500608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:14.464258909 CET500608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:14.469219923 CET80415006082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:22.068722963 CET80415006082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:22.068898916 CET500608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:22.068950891 CET500608041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:22.073759079 CET80415006082.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:22.077786922 CET500618041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:22.082567930 CET80415006182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:22.082660913 CET500618041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:22.082941055 CET500618041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:22.087704897 CET80415006182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.691703081 CET80415006182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.691781044 CET500618041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.692218065 CET500618041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.697037935 CET80415006182.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.707925081 CET500628041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.713036060 CET80415006282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.713115931 CET500628041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.715198994 CET500628041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.720539093 CET80415006282.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.720581055 CET500628041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:29.854578972 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:29.859635115 CET80415006380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:29.859714985 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:29.859987974 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:29.864830971 CET80415006380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:30.917491913 CET80415006380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:30.917579889 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.917896986 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.923012018 CET80415006380.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:30.923069954 CET500638041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.925050974 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.929960012 CET80415006480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:30.930092096 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.930646896 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:30.935452938 CET80415006480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:31.994606972 CET80415006480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:31.994698048 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:31.995014906 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:32.000528097 CET80415006480.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:32.000579119 CET500648041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:32.001466990 CET500658041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:32.006346941 CET80415006580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:32.006438017 CET500658041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:32.008614063 CET500658041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:32.013679028 CET80415006580.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:32.013727903 CET500658041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:34.047194958 CET500668041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:34.052191973 CET80415006682.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:34.052308083 CET500668041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:34.052835941 CET500668041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:34.057621956 CET80415006682.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:41.846878052 CET80415006682.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:41.846963882 CET500668041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:41.847063065 CET500668041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:41.850825071 CET500678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:41.851836920 CET80415006682.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:41.855788946 CET80415006782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:41.855865002 CET500678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:41.856117010 CET500678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:41.860907078 CET80415006782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:49.477014065 CET80415006782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:49.477102995 CET500678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:49.477194071 CET500678041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:49.481211901 CET500688041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:49.482009888 CET80415006782.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:49.486102104 CET80415006882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:49.486175060 CET500688041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:49.486269951 CET500688041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:49.491338968 CET80415006882.115.223.39192.168.2.4
                                                                                                        Nov 3, 2024 10:15:49.491396904 CET500688041192.168.2.482.115.223.39
                                                                                                        Nov 3, 2024 10:15:53.512582064 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:53.517616987 CET80415006980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:53.517688990 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:53.518038988 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:53.522891998 CET80415006980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:54.572626114 CET80415006980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:54.573110104 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.573324919 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.578763008 CET80415006980.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:54.578824997 CET500698041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.582356930 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.587456942 CET80415007080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:54.589025974 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.589498043 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:54.596257925 CET80415007080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:55.642210960 CET80415007080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:55.642287016 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.642621994 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.645991087 CET500718041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.648489952 CET80415007080.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:55.648540974 CET500708041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.650783062 CET80415007180.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:55.650842905 CET500718041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.650938988 CET500718041192.168.2.480.78.24.30
                                                                                                        Nov 3, 2024 10:15:55.656101942 CET80415007180.78.24.30192.168.2.4
                                                                                                        Nov 3, 2024 10:15:55.656171083 CET500718041192.168.2.480.78.24.30
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Nov 3, 2024 10:13:05.691745996 CET5924253192.168.2.41.1.1.1
                                                                                                        Nov 3, 2024 10:13:06.167999983 CET53592421.1.1.1192.168.2.4
                                                                                                        Nov 3, 2024 10:13:39.884980917 CET5021853192.168.2.41.1.1.1
                                                                                                        Nov 3, 2024 10:13:40.016722918 CET53502181.1.1.1192.168.2.4
                                                                                                        Nov 3, 2024 10:14:19.623254061 CET4968653192.168.2.41.1.1.1
                                                                                                        Nov 3, 2024 10:14:19.658288002 CET53496861.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Nov 3, 2024 10:13:05.691745996 CET192.168.2.41.1.1.10xaa36Standard query (0)greshunka.comA (IP address)IN (0x0001)false
                                                                                                        Nov 3, 2024 10:13:39.884980917 CET192.168.2.41.1.1.10x474cStandard query (0)tiguanin.comA (IP address)IN (0x0001)false
                                                                                                        Nov 3, 2024 10:14:19.623254061 CET192.168.2.41.1.1.10x8cb9Standard query (0)bazarunet.comA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Nov 3, 2024 10:13:06.167999983 CET1.1.1.1192.168.2.40xaa36No error (0)greshunka.com82.115.223.39A (IP address)IN (0x0001)false
                                                                                                        Nov 3, 2024 10:13:40.016722918 CET1.1.1.1192.168.2.40x474cNo error (0)tiguanin.com80.78.24.30A (IP address)IN (0x0001)false
                                                                                                        Nov 3, 2024 10:14:19.658288002 CET1.1.1.1192.168.2.40x8cb9No error (0)bazarunet.com80.78.24.30A (IP address)IN (0x0001)false
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.44975480.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:13:41.084125042 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.44975580.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:13:42.185731888 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.44975880.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:13:44.415111065 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        3192.168.2.44981880.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:04.028563976 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        4192.168.2.44983980.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:08.183645964 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        5192.168.2.44987880.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:16.578778028 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        6192.168.2.44990580.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:21.805670977 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        7192.168.2.45001680.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:45.301837921 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        8192.168.2.45002780.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:47.482707024 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        9192.168.2.45003380.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:14:48.564397097 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        10192.168.2.45005580.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:10.046612024 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        11192.168.2.45005780.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:12.153237104 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        12192.168.2.45006380.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:30.917491913 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        13192.168.2.45006480.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:31.994606972 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        14192.168.2.45006980.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:54.572626114 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        15192.168.2.45007080.78.24.3080417564C:\Windows\System32\rundll32.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Nov 3, 2024 10:15:55.642210960 CET103INHTTP/1.1 400 Bad Request
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Connection: close
                                                                                                        Data Raw: 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74
                                                                                                        Data Ascii: 400 Bad Request


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:04:12:50
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\loaddll64.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:loaddll64.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll"
                                                                                                        Imagebase:0x7ff66fd60000
                                                                                                        File size:165'888 bytes
                                                                                                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:1
                                                                                                        Start time:04:12:50
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff7699e0000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:04:12:50
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1
                                                                                                        Imagebase:0x7ff7a91d0000
                                                                                                        File size:289'792 bytes
                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:3
                                                                                                        Start time:04:12:50
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCloseCooking
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:4
                                                                                                        Start time:04:12:50
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",#1
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:5
                                                                                                        Start time:04:12:53
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookClothMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:6
                                                                                                        Start time:04:12:56
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe C:\Users\user\Desktop\PhysXCooking64.dll.dll,NxCookConvexMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:7
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCloseCooking
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:8
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookClothMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:9
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookConvexMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:10
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:11
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:12
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReportCooking
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:13
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxReleasePMap
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:14
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:15
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxInitCooking
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:16
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",GetDeepDVCState
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_Bazar_2, Description: Yara detected Bazar Loader, Source: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Bazar_2, Description: Yara detected Bazar Loader, Source: 00000010.00000002.3522296850.000002C0CE150000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000003.1767044867.000002C0CFC17000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Has exited:false

                                                                                                        Target ID:17
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",DetDeepDVCState
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:18
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCreatePMap
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:19
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookTriangleMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:20
                                                                                                        Start time:04:12:59
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\rundll32.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:rundll32.exe "C:\Users\user\Desktop\PhysXCooking64.dll.dll",NxCookSoftBodyMesh
                                                                                                        Imagebase:0x7ff6b1580000
                                                                                                        File size:71'680 bytes
                                                                                                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:24
                                                                                                        Start time:04:13:00
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\WerFault.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7556 -s 332
                                                                                                        Imagebase:0x7ff760930000
                                                                                                        File size:570'736 bytes
                                                                                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:25
                                                                                                        Start time:04:13:00
                                                                                                        Start date:03/11/2024
                                                                                                        Path:C:\Windows\System32\WerFault.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7540 -s 332
                                                                                                        Imagebase:0x7ff760930000
                                                                                                        File size:570'736 bytes
                                                                                                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:0.1%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:5.7%
                                                                                                          Total number of Nodes:87
                                                                                                          Total number of Limit Nodes:1
                                                                                                          execution_graph 20310 180049ee4 63 API calls 2 library calls 20332 180040170 5 API calls _DllMainCRTStartup 20312 1800010f0 62 API calls _Ref_count 20335 180005370 closesocket 20296 18004d074 CloseHandle 20336 18004d574 LeaveCriticalSection LeaveCriticalSection _freefls$fin$0 wprintf 20297 18004d47e 65 API calls 3 library calls 20313 180043d00 91 API calls 20314 180018300 119 API calls 2 library calls 20273 18003e408 64 API calls 2 library calls 20340 180040b84 64 API calls wprintf 20275 18004ce10 70 API calls 3 library calls 20279 18004d416 LeaveCriticalSection fwprintf$fin$0 20319 18001a120 89 API calls 20321 18003f124 61 API calls _getptd 20302 18002f2b0 9 API calls 20282 180013830 72 API calls 20283 180009a30 8 API calls _cftof_l 20342 18004d5bf LeaveCriticalSection LeaveCriticalSection LeaveCriticalSection _freefls$fin$0 20304 18002f4c0 102 API calls 20324 18002f340 100 API calls _cftof_l 20284 180019c40 99 API calls 20344 180019dc0 76 API calls 20305 1800014c0 DeleteCriticalSection 20346 180042bbc RtlUnwindEx _cinit 20286 180046650 63 API calls _getptd 20327 180019f50 62 API calls 20192 180040054 20194 18004007a 20192->20194 20193 180040082 20194->20193 20196 1800400b7 20194->20196 20200 18003ff00 20194->20200 20196->20193 20198 18003ff00 117 API calls 20196->20198 20199 1800400fc 20196->20199 20197 18003ff00 117 API calls 20197->20193 20198->20199 20199->20193 20199->20197 20201 18003ff12 20200->20201 20202 18003ff8f 20200->20202 20247 180040824 HeapCreate 20201->20247 20204 18003ff93 20202->20204 20205 18003ffe0 20202->20205 20210 18003ffca 20204->20210 20226 18003ff1b 20204->20226 20261 180044588 62 API calls free 20204->20261 20206 18004003b 20205->20206 20209 18003ffe5 powf 20205->20209 20206->20226 20268 180043484 63 API calls _freefls 20206->20268 20265 180042a74 61 API calls __onexitinit 20209->20265 20210->20226 20264 1800431c8 64 API calls free 20210->20264 20212 18003ff27 _RTC_Initialize 20215 18003ff2b 20212->20215 20225 18003ff37 GetCommandLineA 20212->20225 20253 18004087c HeapDestroy 20215->20253 20216 18003fff9 20219 180040005 FlsSetValue 20216->20219 20216->20226 20217 18003ffc0 20262 1800431c8 64 API calls free 20217->20262 20222 180040031 20219->20222 20223 18004001b 20219->20223 20267 18003e220 61 API calls _errno 20222->20267 20266 1800431f0 61 API calls 3 library calls 20223->20266 20224 18003ffc5 20263 18004087c HeapDestroy 20224->20263 20254 180045ffc 66 API calls 2 library calls 20225->20254 20226->20196 20231 180040022 GetCurrentThreadId 20231->20226 20232 18003ff49 20255 1800442b4 68 API calls __onexitinit 20232->20255 20233 18003ff7d 20233->20226 20235 18003ff55 20236 18003ff59 20235->20236 20237 18003ff60 20235->20237 20256 1800431c8 64 API calls free 20236->20256 20257 180045f04 76 API calls 2 library calls 20237->20257 20240 18003ff65 20241 18003ff79 20240->20241 20258 180045c04 75 API calls 5 library calls 20240->20258 20241->20233 20260 180044588 62 API calls free 20241->20260 20244 18003ff6e 20244->20241 20259 1800402d0 72 API calls 2 library calls 20244->20259 20245 18003ff8d 20245->20236 20248 18003ff17 20247->20248 20249 18004084c GetVersion 20247->20249 20248->20226 20252 1800434c4 69 API calls 3 library calls 20248->20252 20250 180040856 HeapSetInformation 20249->20250 20251 180040870 20249->20251 20250->20251 20251->20248 20252->20212 20253->20226 20254->20232 20255->20235 20256->20215 20257->20240 20258->20244 20259->20241 20260->20245 20261->20217 20262->20224 20263->20210 20264->20226 20265->20216 20266->20231 20267->20233 20268->20226 20348 18003e5e0 62 API calls __onexitinit 20293 180005260 11 API calls 2 library calls 20352 1800053e0 send

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 70 180040824-18004084a HeapCreate 71 180040875-180040879 70->71 72 18004084c-180040854 GetVersion 70->72 73 180040856-18004086a HeapSetInformation 72->73 74 180040870 72->74 73->74 74->71
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Heap$CreateInformationVersion
                                                                                                          • String ID:
                                                                                                          • API String ID: 3563531100-0
                                                                                                          • Opcode ID: e32ab0bd0fee94bccc68f32d9a077722b0d5913c979a1ba73cc683a210d046bc
                                                                                                          • Instruction ID: 988e22e6e5946a36f70c9e45e8ed652961c4ed90b6ce8b9843ec7a251a3b24ee
                                                                                                          • Opcode Fuzzy Hash: e32ab0bd0fee94bccc68f32d9a077722b0d5913c979a1ba73cc683a210d046bc
                                                                                                          • Instruction Fuzzy Hash: 70E09274611F8882F7C69710AC897D52261B79C3C8FA18418F94A42B64DF3CC2CD8708

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 0000000180040824: HeapCreate.KERNELBASE ref: 000000018004083A
                                                                                                            • Part of subcall function 0000000180040824: GetVersion.KERNEL32 ref: 000000018004084C
                                                                                                            • Part of subcall function 0000000180040824: HeapSetInformation.KERNEL32 ref: 000000018004086A
                                                                                                          • _RTC_Initialize.LIBCMT ref: 000000018003FF32
                                                                                                          • GetCommandLineA.KERNEL32 ref: 000000018003FF37
                                                                                                            • Part of subcall function 0000000180045FFC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 0000000180046015
                                                                                                            • Part of subcall function 0000000180045FFC: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 000000018004606C
                                                                                                            • Part of subcall function 0000000180045FFC: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 00000001800460A7
                                                                                                            • Part of subcall function 0000000180045FFC: free.LIBCMT ref: 00000001800460B4
                                                                                                            • Part of subcall function 0000000180045FFC: FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 00000001800460BF
                                                                                                            • Part of subcall function 00000001800442B4: GetStartupInfoW.KERNEL32 ref: 00000001800442D5
                                                                                                          • __setargv.LIBCMT ref: 000000018003FF60
                                                                                                          • _cinit.LIBCMT ref: 000000018003FF74
                                                                                                            • Part of subcall function 00000001800431C8: FlsFree.KERNEL32(?,?,?,?,000000018003FFDE), ref: 00000001800431D7
                                                                                                            • Part of subcall function 00000001800431C8: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000018003FFDE), ref: 00000001800464B7
                                                                                                            • Part of subcall function 00000001800431C8: free.LIBCMT ref: 00000001800464C0
                                                                                                            • Part of subcall function 00000001800431C8: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000018003FFDE), ref: 00000001800464E7
                                                                                                            • Part of subcall function 0000000180042A74: Sleep.KERNEL32(?,?,?,00000001800432DB,?,?,?,00000001800408ED,?,?,?,?,000000018003E245), ref: 0000000180042AB9
                                                                                                          • FlsSetValue.KERNEL32 ref: 000000018004000E
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0000000180040022
                                                                                                          • free.LIBCMT ref: 0000000180040031
                                                                                                            • Part of subcall function 000000018003E220: HeapFree.KERNEL32(?,?,?,000000018000110D), ref: 000000018003E236
                                                                                                            • Part of subcall function 000000018003E220: _errno.LIBCMT ref: 000000018003E240
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentInfoInformationInitializeLineSleepStartupThreadValueVersion__setargv_cinit_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2481119767-0
                                                                                                          • Opcode ID: 61b5e00b11298625462c404e981e4dbee0cdad509bc41096663f8cfabbcd0743
                                                                                                          • Instruction ID: aa315cb78357cfe07c34d30648f785c9cd846825b8d2e9133f4b691ac97a99c6
                                                                                                          • Opcode Fuzzy Hash: 61b5e00b11298625462c404e981e4dbee0cdad509bc41096663f8cfabbcd0743
                                                                                                          • Instruction Fuzzy Hash: C3314C30200A0D89FAF7777059827FA12959F5D3D8F37D534B919852D3EE29874C836A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 283 180044774-1800447bc call 18003f160 286 1800447c5-1800447c8 283->286 287 1800447be-1800447c0 283->287 289 1800447e9-18004481f 286->289 290 1800447ca-1800447dc call 180040904 call 1800408e4 call 180042888 286->290 288 180044eaa-180044ed3 call 18003e5c0 287->288 292 180044827-18004482e 289->292 293 180044821-180044825 289->293 306 1800447e1-1800447e4 290->306 292->290 297 180044830-180044836 292->297 293->292 293->297 299 180044845-18004484e call 180048318 297->299 300 180044838-180044840 call 180048148 297->300 307 180044854-180044865 299->307 308 180044b1e-180044b2f 299->308 300->299 306->288 307->308 311 18004486b-18004489b call 18004332c GetConsoleMode 307->311 309 180044b35-180044b3d 308->309 310 180044e33-180044e4f WriteFile 308->310 313 180044b43-180044b46 309->313 314 180044c0e-180044c12 309->314 315 180044e55-180044e5b 310->315 316 180044b08-180044b10 GetLastError 310->316 311->308 323 1800448a1-1800448a3 311->323 318 180044e69-180044e7f 313->318 319 180044b4c 313->319 321 180044c18-180044c1b 314->321 322 180044cf0-180044cf3 314->322 320 180044e01-180044e03 315->320 316->320 325 180044e81-180044e86 318->325 326 180044e8c-180044e9f call 1800408e4 call 180040904 318->326 324 180044b4f-180044b5b 319->324 327 180044ea4-180044ea8 320->327 328 180044e09-180044e0b 320->328 321->318 330 180044c21 321->330 322->318 329 180044cf9 322->329 332 1800448a5-1800448a8 323->332 333 1800448ae-1800448c2 GetConsoleCP 323->333 334 180044b5d-180044b66 324->334 325->287 325->326 326->306 327->288 328->318 336 180044e0d-180044e10 328->336 337 180044cff-180044d04 329->337 331 180044c26-180044c32 330->331 338 180044c34-180044c3d 331->338 332->308 332->333 339 180044b15-180044b19 333->339 340 1800448c8-1800448cb 333->340 341 180044b68-180044b71 334->341 342 180044b8f-180044bd3 WriteFile 334->342 344 180044e12-180044e24 call 1800408e4 call 180040904 336->344 345 180044e5d-180044e64 call 180040924 336->345 346 180044d06-180044d0f 337->346 347 180044c71-180044cb5 WriteFile 338->347 348 180044c3f-180044c4c 338->348 339->328 350 180044a55-180044a59 340->350 351 1800448d1-1800448f0 340->351 352 180044b73-180044b7b 341->352 353 180044b7e-180044b8d 341->353 342->316 354 180044bd9-180044bef 342->354 344->306 345->306 357 180044d11-180044d1e 346->357 358 180044d40-180044d88 WideCharToMultiByte 346->358 347->316 363 180044cbb-180044cd1 347->363 361 180044c5d-180044c6f 348->361 362 180044c4e-180044c59 348->362 368 180044a61-180044a7d 350->368 369 180044a5b-180044a5f 350->369 365 180044912-18004491c call 1800483c0 351->365 366 1800448f2-180044910 351->366 352->353 353->334 353->342 354->320 367 180044bf5-180044c03 354->367 372 180044d20-180044d28 357->372 373 180044d2c-180044d3e 357->373 359 180044d8e 358->359 360 180044e29-180044e31 GetLastError 358->360 378 180044d90-180044dcd WriteFile 359->378 374 180044dfc 360->374 361->338 361->347 362->361 363->320 375 180044cd7-180044ce5 363->375 393 180044952-180044958 365->393 394 18004491e-18004492b 365->394 376 18004495b-180044968 call 18004a05c 366->376 367->324 379 180044c09 367->379 381 180044a84-180044a88 368->381 369->368 380 180044a7f 369->380 372->373 373->346 373->358 374->320 375->331 389 180044ceb 375->389 399 18004496e-1800449ab WideCharToMultiByte 376->399 400 180044aff-180044b03 376->400 387 180044dcf-180044dd6 378->387 388 180044dda-180044de0 GetLastError 378->388 379->320 380->381 383 180044a90-180044a9f call 180049e88 381->383 384 180044a8a-180044a8e 381->384 383->316 405 180044aa1-180044aa7 383->405 384->383 391 180044aca 384->391 387->378 396 180044dd8 387->396 397 180044de2-180044de5 388->397 389->320 402 180044acf-180044ad7 391->402 393->376 403 180044931-180044947 call 18004a05c 394->403 404 180044ade-180044af6 394->404 396->397 397->374 401 180044de7-180044df6 397->401 399->400 408 1800449b1-1800449e0 WriteFile 399->408 400->320 401->337 401->374 402->400 406 180044ad9 402->406 403->400 413 18004494d-180044950 403->413 404->400 405->391 409 180044aa9-180044ac2 call 180049e88 405->409 406->340 408->316 410 1800449e6-1800449f4 408->410 409->316 417 180044ac4-180044ac6 409->417 410->400 414 1800449fa-180044a04 410->414 413->399 414->402 416 180044a0a-180044a3c WriteFile 414->416 416->316 418 180044a42-180044a47 416->418 417->391 418->400 419 180044a4d-180044a53 418->419 419->402
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                                                          • String ID: U
                                                                                                          • API String ID: 3902385426-4171548499
                                                                                                          • Opcode ID: 2d5ce46ed2b1d32d86571561728c0a6fb84dd56a645abb6e696f7c4412cbdee7
                                                                                                          • Instruction ID: a924f4dc1a727bc392aaaba263266b47709fba0b4cecbfed23009677402f7412
                                                                                                          • Opcode Fuzzy Hash: 2d5ce46ed2b1d32d86571561728c0a6fb84dd56a645abb6e696f7c4412cbdee7
                                                                                                          • Instruction Fuzzy Hash: 3312F633204E4986EBA28F25D4C43EA67A1F38CBC8F568115FA494BA95DF7DC64DC708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$ErrorFileLast$CloseCreateHandle__doserrno_lseek_nolock$_invalid_parameter_noinfo$Type_get_daylight
                                                                                                          • String ID:
                                                                                                          • API String ID: 6860575-0
                                                                                                          • Opcode ID: cdf4a62fadb900c8fb597438bd4298d4d6d6881069ad471e16903e41b3fc6d7c
                                                                                                          • Instruction ID: 757729e4fa89dfb54d60e17dd18de7796d29db1e7fda55289fd633ba8cc53d94
                                                                                                          • Opcode Fuzzy Hash: cdf4a62fadb900c8fb597438bd4298d4d6d6881069ad471e16903e41b3fc6d7c
                                                                                                          • Instruction Fuzzy Hash: 46324A32711E5845FBA6CBB8D4C07EC26A0A3497DCF16C229FA16A77D5CE38CA49C704

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • LoadLibraryW.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046ACD
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046AE9
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046AFB
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B12
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B1B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B32
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B3B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B52
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B5B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B7A
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B83
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046BB6
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046BC6
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C1C
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C3D
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C57
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                                                          • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                                                          • API String ID: 2643518689-564504941
                                                                                                          • Opcode ID: 1824d7e647174aac9ba8a228052728ff37a26939126cb63fc2dd71cb4fdc05b6
                                                                                                          • Instruction ID: df7a2586361332801e439d358c24d371d3d75d19ea64f50f1298fa16b69f6015
                                                                                                          • Opcode Fuzzy Hash: 1824d7e647174aac9ba8a228052728ff37a26939126cb63fc2dd71cb4fdc05b6
                                                                                                          • Instruction Fuzzy Hash: A6514A30602F5980FED7DB51BC943E523A1BB8EBC8F068424BC5E433A0EE38968D8315
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_char$_fileno_getptdfree
                                                                                                          • String ID: $@
                                                                                                          • API String ID: 920461082-1077428164
                                                                                                          • Opcode ID: 9ce62dfc7d1726e45cd4ea0018cda0193fd16e9140b06ccd3c386b2f0c347445
                                                                                                          • Instruction ID: a73cbf3e3e5a568c21571af9e4bb4affdca5ed3204bfc9730e079ae41a4dd57d
                                                                                                          • Opcode Fuzzy Hash: 9ce62dfc7d1726e45cd4ea0018cda0193fd16e9140b06ccd3c386b2f0c347445
                                                                                                          • Instruction Fuzzy Hash: 9B52F172708E8885FBA78B5495803EE6BA1F7897CCFA68015FA45476D5CF38CA49C708

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1182 18004cb30-18004cb66 call 180048148 1185 18004cbb8-18004cbbd call 1800408e4 1182->1185 1186 18004cb68-18004cb79 call 180048148 1182->1186 1191 18004cbbf-18004cbdd 1185->1191 1186->1185 1192 18004cb7b-18004cb84 1186->1192 1193 18004cb8a-18004cbab GetProcessHeap HeapAlloc 1192->1193 1194 18004cc4b 1192->1194 1195 18004cbad-18004cbb2 call 1800408e4 1193->1195 1196 18004cbde-18004cbea call 18004ccc8 1193->1196 1197 18004cc4d-18004cc5e call 180048148 1194->1197 1198 18004ccaa-18004ccbb call 180048148 1194->1198 1195->1185 1208 18004cbed-18004cc04 call 180044774 1196->1208 1197->1185 1209 18004cc64-18004cc83 call 180048db0 SetEndOfFile 1197->1209 1198->1185 1207 18004ccc1-18004ccc3 1198->1207 1207->1191 1215 18004cc06-18004cc0e 1208->1215 1216 18004cc12-18004cc1a call 180040904 1208->1216 1209->1198 1214 18004cc85-18004cc9e call 1800408e4 call 180040904 GetLastError 1209->1214 1230 18004cca0-18004cca4 1214->1230 1219 18004cc10 1215->1219 1220 18004cc2b-18004cc49 call 18004ccc8 GetProcessHeap HeapFree 1215->1220 1224 18004cc27 1216->1224 1225 18004cc1c-18004cc21 call 1800408e4 1216->1225 1219->1208 1220->1230 1224->1220 1225->1224 1230->1185 1230->1198
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$Heap$ErrorFileLastProcess__doserrno$AllocFreePointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 3112900366-0
                                                                                                          • Opcode ID: 5c1484790b7029330c56b00ce7b4326b62192608e4fc1df10d09937e4c225644
                                                                                                          • Instruction ID: fe7456c0442f1bcdb1b8f511e1c750bbd640e26c1f04292c679d1de3200e95df
                                                                                                          • Opcode Fuzzy Hash: 5c1484790b7029330c56b00ce7b4326b62192608e4fc1df10d09937e4c225644
                                                                                                          • Instruction Fuzzy Hash: 6741E131300E5841EAD6AB3598857DC2291A74DBF8F56C711F939077D2DF38CA49878A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1232 180040580-1800405bc call 180040554 1235 1800405c2-1800405cd call 180046e70 1232->1235 1236 1800407b0-1800407dc call 18003e5c0 1232->1236 1241 180040748-180040759 GetStdHandle 1235->1241 1242 1800405d3-1800405dd call 180046e70 1235->1242 1241->1236 1243 18004075b-18004075f 1241->1243 1248 1800405df-1800405e6 1242->1248 1249 1800405ec-1800405f2 1242->1249 1243->1236 1245 180040761-180040763 1243->1245 1247 180040768-180040770 1245->1247 1250 180040772-180040781 1247->1250 1251 180040783-1800407aa call 1800469e0 WriteFile 1247->1251 1248->1241 1248->1249 1249->1236 1252 1800405f8-18004061b call 180046e04 1249->1252 1250->1247 1250->1251 1251->1236 1257 180040735-180040747 call 1800427e4 1252->1257 1258 180040621-180040645 GetModuleFileNameW 1252->1258 1257->1241 1259 180040647-18004065a call 180046e04 1258->1259 1260 180040671-180040680 call 180046de8 1258->1260 1259->1260 1267 18004065c-180040670 call 1800427e4 1259->1267 1268 180040682-1800406b2 call 180046de8 call 180046d18 1260->1268 1269 1800406c9-1800406dd call 180046c90 1260->1269 1267->1260 1268->1269 1282 1800406b4-1800406c8 call 1800427e4 1268->1282 1276 1800406df-1800406ef call 180046c90 1269->1276 1277 180040720-180040734 call 1800427e4 1269->1277 1286 1800406f1-180040706 call 180046a88 1276->1286 1287 18004070b-18004071f call 1800427e4 1276->1287 1277->1257 1282->1269 1286->1236 1287->1277
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
                                                                                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                          • API String ID: 2183313154-4022980321
                                                                                                          • Opcode ID: ba61b9740d2fabcbb053f7a8c1a04480db4f8b8fe58e62101f9bba5b1f63e096
                                                                                                          • Instruction ID: afc2a24109b5524a715c6b2c3ba94efa30044fcd1fda98386a67971cc6d85b1b
                                                                                                          • Opcode Fuzzy Hash: ba61b9740d2fabcbb053f7a8c1a04480db4f8b8fe58e62101f9bba5b1f63e096
                                                                                                          • Instruction Fuzzy Hash: 1851F131B04A8845F7E6DB25A8917DA22A1A78D7C8F668112FE5A03B95DF38C30DC709

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1498 180041044-180041092 call 180040ae0 1501 180041094-180041099 call 1800408e4 1498->1501 1502 1800410bb-1800410be 1498->1502 1511 18004109c-1800410a7 call 180042888 1501->1511 1504 1800410e4-1800410f2 1502->1504 1505 1800410c0-1800410d5 call 1800408e4 call 180042888 1502->1505 1506 1800410f4-1800410fe call 1800408e4 1504->1506 1507 180041100-180041112 1504->1507 1527 1800410b4-1800410b6 1505->1527 1531 1800410d7-1800410e2 1505->1531 1506->1511 1512 180041118-18004113f call 180040f4c 1507->1512 1513 1800411ab-1800411b8 1507->1513 1511->1527 1528 1800410a9-1800410ad 1511->1528 1529 180041141-180041148 1512->1529 1530 18004115e-180041162 1512->1530 1515 1800411c0-180041201 1513->1515 1516 1800411ba-1800411bd 1513->1516 1521 180041222-180041226 1515->1521 1522 180041203-180041220 1515->1522 1516->1515 1526 18004122a-180041236 1521->1526 1522->1526 1532 180041238-18004123b 1526->1532 1533 18004123d-18004124d 1526->1533 1534 18004140a-180041423 1527->1534 1528->1527 1529->1534 1535 18004114e-180041159 1529->1535 1536 180041164-180041167 1530->1536 1537 18004116a-180041190 call 180046f14 1530->1537 1531->1527 1538 180041250-180041253 1532->1538 1533->1538 1535->1534 1536->1537 1546 1800411a2-1800411a6 1537->1546 1547 180041192-18004119e 1537->1547 1540 1800412e4-1800412e7 1538->1540 1541 180041259 1538->1541 1543 180041308-18004132b 1540->1543 1544 1800412e9-180041304 call 18003ece0 1540->1544 1545 180041263-180041266 1541->1545 1552 180041337-18004133f 1543->1552 1553 18004132d-180041335 1543->1553 1544->1543 1550 180041297-18004129b 1545->1550 1551 180041268-18004127f 1545->1551 1548 1800413fb 1546->1548 1547->1546 1555 180041408 1548->1555 1556 1800413fd-180041401 1548->1556 1550->1540 1560 18004129d-1800412b0 1550->1560 1558 180041281 1551->1558 1559 180041284-180041295 1551->1559 1554 180041342-18004134f 1552->1554 1553->1554 1562 180041351-180041382 1554->1562 1563 180041384-180041388 1554->1563 1555->1534 1556->1555 1558->1559 1559->1545 1559->1550 1560->1540 1561 1800412b2 1560->1561 1564 1800412b6-1800412b9 1561->1564 1562->1563 1565 18004138a-1800413b5 1562->1565 1563->1565 1566 1800413b8-1800413bb 1563->1566 1567 1800412c0-1800412c6 1564->1567 1568 1800412bb-1800412be 1564->1568 1565->1566 1569 1800413c3-1800413eb 1566->1569 1570 1800413bd-1800413c1 1566->1570 1567->1564 1568->1567 1571 1800412c8-1800412cb 1568->1571 1572 1800413ee-1800413f7 1569->1572 1570->1569 1570->1572 1573 1800412e1 1571->1573 1574 1800412cd-1800412d2 1571->1574 1572->1548 1573->1540 1575 1800412d4-1800412d9 1574->1575 1576 1800412db-1800412df 1574->1576 1575->1540 1576->1540
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
                                                                                                          • String ID: gfffffff
                                                                                                          • API String ID: 1282097019-1523873471
                                                                                                          • Opcode ID: 24a95ef78a624545ba7c9d7dc106d39f48c7645bdea6b767835b0edbd9f1c844
                                                                                                          • Instruction ID: cd9f51b8cdbe88b98d15d95ecd3b9eaa2330d4955cd9fdd12c4ed391452db137
                                                                                                          • Opcode Fuzzy Hash: 24a95ef78a624545ba7c9d7dc106d39f48c7645bdea6b767835b0edbd9f1c844
                                                                                                          • Instruction Fuzzy Hash: 3EB17773704BC88AEB92CB25C6803DD6BA5F3197D9F05C621EF59877D5EA388629C304
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 3778485334-0
                                                                                                          • Opcode ID: c3598976ca1632c357be4ba8301645e2a35c7deb92361203275c35b9385dcc3e
                                                                                                          • Instruction ID: 868fa4e71887f5911bd689abb344e6afb6984900060eeb71dea75f24283ff6da
                                                                                                          • Opcode Fuzzy Hash: c3598976ca1632c357be4ba8301645e2a35c7deb92361203275c35b9385dcc3e
                                                                                                          • Instruction Fuzzy Hash: 6C31F335208F8885EB929B10F8843DA73A1F78D3D8F518126FA9D42BA5DF7CC298C705
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosf
                                                                                                          • String ID: Cant normalize ZERO vector$VUUU$VUUU
                                                                                                          • API String ID: 3953124788-2926792483
                                                                                                          • Opcode ID: b92377ace262dadcb44eaa4825634ab27a3adf4bf1b68f1153cd6b28c1d1e0c2
                                                                                                          • Instruction ID: 8ebbcb85a410bf6a645dd75cc33d335b818cb10fe72586fe260dc28c1af0858f
                                                                                                          • Opcode Fuzzy Hash: b92377ace262dadcb44eaa4825634ab27a3adf4bf1b68f1153cd6b28c1d1e0c2
                                                                                                          • Instruction Fuzzy Hash: 8872D432A14A8886D752CF3AD4813AAB7A0FB9D785F19C706EB4963774DF35D189CB00
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: #8BQ$6cgv$Ftt$J^1#$NwEz$do@#$xBO?
                                                                                                          • API String ID: 0-2817147213
                                                                                                          • Opcode ID: 5b77fe72eaddb53b703fe21e6f9f9f3e6d288ab5ce12969816a75deff9559122
                                                                                                          • Instruction ID: cda52e59a6181bcc1e9931452a8ff373926afa540e7e1d9509708c0067d5f037
                                                                                                          • Opcode Fuzzy Hash: 5b77fe72eaddb53b703fe21e6f9f9f3e6d288ab5ce12969816a75deff9559122
                                                                                                          • Instruction Fuzzy Hash: 70D12772705B9886EB6ACF21D0847ED7BA1F709BC8F468025EE0A17B54DF38D649C708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1239891234-0
                                                                                                          • Opcode ID: 687f001dfb37a47157b6f2a046625e947f4851768aa9483d248bdf8ccabb4226
                                                                                                          • Instruction ID: ce6028df09523790c5ce4c1857c5788db5e4af3653a889637483fba63be9d821
                                                                                                          • Opcode Fuzzy Hash: 687f001dfb37a47157b6f2a046625e947f4851768aa9483d248bdf8ccabb4226
                                                                                                          • Instruction Fuzzy Hash: C8319132204F8486EBA1CF25E8807DE77A0F788798F51411AFA9D43B99DF38C649CB00
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _set_statfp
                                                                                                          • String ID: !$atan2f
                                                                                                          • API String ID: 1156100317-746904718
                                                                                                          • Opcode ID: 922dedef4b508459671a67f39f388c8a37360033d7157b9d186a1199daea5b28
                                                                                                          • Instruction ID: d5c9dca1ae84759df08d4f946077274373d06d771ca18e833c4e4ac63076a48d
                                                                                                          • Opcode Fuzzy Hash: 922dedef4b508459671a67f39f388c8a37360033d7157b9d186a1199daea5b28
                                                                                                          • Instruction Fuzzy Hash: 43C1D231624ECC88E6B78B3254103E7E3547F5F7D4F16D312B92A36AD4EF29868A8700
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                          • String ID:
                                                                                                          • API String ID: 1445889803-0
                                                                                                          • Opcode ID: 92565ea8d5c85b212df12a7ebaa521c2a5878a6861afd3c9b07c384d7c5c1395
                                                                                                          • Instruction ID: 4acdcd43e76b003da33731daa7b3035c29bec53c6226794cfad176108422307a
                                                                                                          • Opcode Fuzzy Hash: 92565ea8d5c85b212df12a7ebaa521c2a5878a6861afd3c9b07c384d7c5c1395
                                                                                                          • Instruction Fuzzy Hash: 3101A131214E4886E792CF21E8847857360F74DBD8F05A520FE6A177A0DF38CAC88305
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                          • API String ID: 0-2761157908
                                                                                                          • Opcode ID: 15df8c0887e0000742dc0fce623b2a10b3cc1c0418acf83a7d3470be4994e7f8
                                                                                                          • Instruction ID: b11c022b24f10193ce3ce715ff24ddb663a1b91023c54f09b49952ae2bbc4a46
                                                                                                          • Opcode Fuzzy Hash: 15df8c0887e0000742dc0fce623b2a10b3cc1c0418acf83a7d3470be4994e7f8
                                                                                                          • Instruction Fuzzy Hash: C562D276B14A588AF7A6CF75C050FED37B1B75838CF42D019EE0167A84EA348A19C74A
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2959964966-0
                                                                                                          • Opcode ID: a3c4391194da57d1acbd5fb50f20acf309594c971f8b73a6be8099d63eea8d17
                                                                                                          • Instruction ID: 713e426ca326a16ee2fdce1f5640ab90c17c839528a9bd35edfd2c2478f43a67
                                                                                                          • Opcode Fuzzy Hash: a3c4391194da57d1acbd5fb50f20acf309594c971f8b73a6be8099d63eea8d17
                                                                                                          • Instruction Fuzzy Hash: CF32C372B04A488AF7A68F65C0D07EC37A6B7183CCF56801AEF45976C5DE358A4EC709
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: @$@
                                                                                                          • API String ID: 0-149943524
                                                                                                          • Opcode ID: 85c97c0bcd6a7545fcef9045b8cc4f5e6091eb89f87564d17f037fd72c8897f0
                                                                                                          • Instruction ID: f70c8b40b880a7ab01affacd54e4018a46f696cdd9b649769b2a316347d57481
                                                                                                          • Opcode Fuzzy Hash: 85c97c0bcd6a7545fcef9045b8cc4f5e6091eb89f87564d17f037fd72c8897f0
                                                                                                          • Instruction Fuzzy Hash: 0E6285B6300A9886EB95CF26E488B9E77A4F748BC8F15C026EE4D57B64DF34C659C700
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: ..\..\Core\Common\src\cloth\ClothMesh.cpp$Soft body mesh tetrahedron %d has illegal winding order.
                                                                                                          • API String ID: 0-2497088621
                                                                                                          • Opcode ID: 1d50ed93a4618e66e24dcec245453436e13a514052afe5ea02e4ca5acb916706
                                                                                                          • Instruction ID: a3d31b81d13a8ace292743cbd62ef8cbd031ba2a79883c43894d028611e5d813
                                                                                                          • Opcode Fuzzy Hash: 1d50ed93a4618e66e24dcec245453436e13a514052afe5ea02e4ca5acb916706
                                                                                                          • Instruction Fuzzy Hash: E842DF72A14A888AD742CF2AD08479D73A4FB9DB84F25C712EB4963794DF36D588CB00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fbee738133f138012f8b5ef05bc2e31700efd1da7298d87b3813d35018dadd77
                                                                                                          • Instruction ID: c6f1ca7cfed251379cfc02395260be4996054513fff38885842a45b59efab70e
                                                                                                          • Opcode Fuzzy Hash: fbee738133f138012f8b5ef05bc2e31700efd1da7298d87b3813d35018dadd77
                                                                                                          • Instruction Fuzzy Hash: 1672B5B7205AD49BCB96CF3690953EC7BA1F31DB88F488216EF8903B45DA34D268C751
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ffcc582a9050cf982f0d807d56d005ee6358e83d786e71fbaccbf9bfcd0f5797
                                                                                                          • Instruction ID: ebf9e38626cd392762ad5c2e97b3f51e2c0a9d947e66d2cde2cf2708d2041996
                                                                                                          • Opcode Fuzzy Hash: ffcc582a9050cf982f0d807d56d005ee6358e83d786e71fbaccbf9bfcd0f5797
                                                                                                          • Instruction Fuzzy Hash: 79527876605B8886DB92DF2AE04079DBBA1F789FD4F148116EF8A07B58DF38C585CB40
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6eb4c518925a41008fc2166ad5c9599bef2916ff3bd583f28f838cf1dee5d34f
                                                                                                          • Instruction ID: aa775bea4725cb1641bae394a9020f8cd4f7d9f92af53996f8b7f390fd76fce0
                                                                                                          • Opcode Fuzzy Hash: 6eb4c518925a41008fc2166ad5c9599bef2916ff3bd583f28f838cf1dee5d34f
                                                                                                          • Instruction Fuzzy Hash: A4523C76604A84CAD766CF2AD4807DE77B5F78CB88F158216EB8983B68DF35C645CB00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 80e7507d674b60108a5ed3db11562a0694abd5f334d3008d851f2509531dd33c
                                                                                                          • Instruction ID: 74ba95146f3c6d4679feb7debc9c182cb364a069b4fe51ca6d8ab09e0996cc60
                                                                                                          • Opcode Fuzzy Hash: 80e7507d674b60108a5ed3db11562a0694abd5f334d3008d851f2509531dd33c
                                                                                                          • Instruction Fuzzy Hash: A932AE33610A488FD756CF7AD04079D7BB2FB89B98F149704EA0927A99EB34D598DF00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f86c5276f871af8caa5f57583e7fd56ea31ebf255445abbf96b92eb17ef30777
                                                                                                          • Instruction ID: f11bf07547a1c462bdeaa0c6079fa73f50b1e03a4d6c2a5054af169923359f37
                                                                                                          • Opcode Fuzzy Hash: f86c5276f871af8caa5f57583e7fd56ea31ebf255445abbf96b92eb17ef30777
                                                                                                          • Instruction Fuzzy Hash: 9422B073A15A888AC752DF77D08069D7BA0FB9D780F5AC712EE48237A1DB35E549CB00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f33ed337b245025f98dbe79e223858b09af833faf82940d1042a9ff0eacf7cf6
                                                                                                          • Instruction ID: 18aac2264636b9fa25db152558233bd7852fdd9051005b52d3d8a3e949557afe
                                                                                                          • Opcode Fuzzy Hash: f33ed337b245025f98dbe79e223858b09af833faf82940d1042a9ff0eacf7cf6
                                                                                                          • Instruction Fuzzy Hash: DBF1AE32210AA881DB94DBA6D4597FFB399EB99BC0F01C016EE8E537D1CE38D248D350
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 31af57c14ef2b965298ff3f426071afa22a92dbd6a03d660c58aaa3717c62eeb
                                                                                                          • Instruction ID: b245657265380e4d80289c27db30fa78f0cbd9f72ef22055fe0fd094c9259256
                                                                                                          • Opcode Fuzzy Hash: 31af57c14ef2b965298ff3f426071afa22a92dbd6a03d660c58aaa3717c62eeb
                                                                                                          • Instruction Fuzzy Hash: 7EF19E76711A48CAEB92DFA5D0447DE37A1F789FD4F468126EE0A07784DE34CA49C740
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f40d0ab21d99fccb9fca75bb9d91f321fd5ca23cb4bac666fbe0ae193a08d680
                                                                                                          • Instruction ID: 203a0c91e28472cdd3cf4a1ebdc3c189530cbf03260d6ef9639e68d47f3d3c12
                                                                                                          • Opcode Fuzzy Hash: f40d0ab21d99fccb9fca75bb9d91f321fd5ca23cb4bac666fbe0ae193a08d680
                                                                                                          • Instruction Fuzzy Hash: 0002B132B14B8C8BE352CF7A90417AD73A2EB9D798F198706EE44777A8DB30A555C700
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 67ae1094a7218bc64d889032dd45897d5fa4065f8b21b367b7bfc5da67180d22
                                                                                                          • Instruction ID: 9033d227dc0a814af50fee3b50408a5ad3919072a0ba6c33c4cc67aee827d8e3
                                                                                                          • Opcode Fuzzy Hash: 67ae1094a7218bc64d889032dd45897d5fa4065f8b21b367b7bfc5da67180d22
                                                                                                          • Instruction Fuzzy Hash: 1B028B77600A8886DB92DF2AD080B9DB7A0F789FD4F19D212EE4A17764DF35C989C740
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 341434670c4e157628bf77708c0d963604194d1386a15dfb54d54d2277b4e294
                                                                                                          • Instruction ID: d1de30ef56593cdad6fba35603321ce49a64bdbd2aabed9996cf504b2b6c6a06
                                                                                                          • Opcode Fuzzy Hash: 341434670c4e157628bf77708c0d963604194d1386a15dfb54d54d2277b4e294
                                                                                                          • Instruction Fuzzy Hash: 7E026A72605A888AEB56DF2BD08039D7770FB8DB84F558202EE4A237A5DF34D59AC700
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f123c3bdd6dc4bec3c1bb22c891037d48940db56669e55aa6772d4f87ecbb744
                                                                                                          • Instruction ID: 89efe48841236b40baaf716c1794e15984c2a8df918ba7c91b5974f176eaa130
                                                                                                          • Opcode Fuzzy Hash: f123c3bdd6dc4bec3c1bb22c891037d48940db56669e55aa6772d4f87ecbb744
                                                                                                          • Instruction Fuzzy Hash: A1D199B2B10B8887EA49CB6AD1447D8B3A1F79DBC4F049612EF4D1B794EF35E1568700
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6873bf1e5c25d4720d09ac23e33e5db5bea021f72466a92713b0ab2d34dd4cfc
                                                                                                          • Instruction ID: eadffc442b805bed14180cb723d8c7126062f3794b58b805b68d660bafed5dfd
                                                                                                          • Opcode Fuzzy Hash: 6873bf1e5c25d4720d09ac23e33e5db5bea021f72466a92713b0ab2d34dd4cfc
                                                                                                          • Instruction Fuzzy Hash: 1BA1A176215A8886EB92DF25D4047DE37A1F78AFC4F448036FE0A0B799DE39C649C710
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4d67c38e72f86aff77d9716bc29b1c9c8598c5684548c08387034fc315ced36a
                                                                                                          • Instruction ID: 5fa45148af4a89ee130712a850f70836a840fe8340997d07769affefdddec7f9
                                                                                                          • Opcode Fuzzy Hash: 4d67c38e72f86aff77d9716bc29b1c9c8598c5684548c08387034fc315ced36a
                                                                                                          • Instruction Fuzzy Hash: 5C815432E24F8C89E363CB7794827E97361BFAE388F19D702BE44315A5DB345595AA00
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: a84a00940841a07d6a4f4d34eb23f93d9f0dcc6fe73abedee6fef420e945d121
                                                                                                          • Instruction ID: d7382ce042898ec5f61c79f00eda4c3b62ee3afc4a13f3f8e0266efc75b7ad79
                                                                                                          • Opcode Fuzzy Hash: a84a00940841a07d6a4f4d34eb23f93d9f0dcc6fe73abedee6fef420e945d121
                                                                                                          • Instruction Fuzzy Hash: 3F51D5B37206BC8BE799CF18E154F5936A9F368384F42D019FA4283F44EA76D954CB04
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 1621c0e17353819446ef7b6a725b7419b576c8c873dac34281814b8c3079f79e
                                                                                                          • Instruction ID: d9df9a26f6d54beacce19ced527af61e258992433bf75d622076c3d8202b239e
                                                                                                          • Opcode Fuzzy Hash: 1621c0e17353819446ef7b6a725b7419b576c8c873dac34281814b8c3079f79e
                                                                                                          • Instruction Fuzzy Hash: B05136F3724A4842DF15CF15E48A7A9A692E7987C8F01E235EE5E17B88DA3CD648C344
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 3c9972286ccc0c398e66616e7ee2097638ec5dfe683b87240fba03bf5371292c
                                                                                                          • Instruction ID: ce5edfddca3263b888669e862347e95ca466a6a16ca3ec66af239e35ff603e8d
                                                                                                          • Opcode Fuzzy Hash: 3c9972286ccc0c398e66616e7ee2097638ec5dfe683b87240fba03bf5371292c
                                                                                                          • Instruction Fuzzy Hash: 6551D876504E0986DBE1CE1DE480B9E7B92F7987E8F509301EB6513BE4CB35CA5ADB00

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 108 18004a638-18004a63b 109 18004aa25 108->109 110 18004a641-18004aa24 call 18003e220 * 86 108->110 110->109
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2737118440-0
                                                                                                          • Opcode ID: 258e030ea8eef92e677a1f4030c5f0b19a91ecd9a257867854d2aa094b2d70cf
                                                                                                          • Instruction ID: 4d872ec27d9ca8d6f8751ad299c95db9e4a79eb5509a17a55bae787e74e0c8bc
                                                                                                          • Opcode Fuzzy Hash: 258e030ea8eef92e677a1f4030c5f0b19a91ecd9a257867854d2aa094b2d70cf
                                                                                                          • Instruction Fuzzy Hash: 54A1553121158885E6C3BB71F8957DF1325ABCAF84F059E32BB4D4B5E7CE10DA498390
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2315031519-0
                                                                                                          • Opcode ID: 27ee3e071bdb6c1f7188517e3c46bf29d4632009371291bd4a31ced4f22275c5
                                                                                                          • Instruction ID: beaf73869c5ab8301a8de9efe598f3bfa40f1db9310f99e121f6dd647ad85f45
                                                                                                          • Opcode Fuzzy Hash: 27ee3e071bdb6c1f7188517e3c46bf29d4632009371291bd4a31ced4f22275c5
                                                                                                          • Instruction Fuzzy Hash: 8322F572205E8886F7A38F64D4C03EC2B91A749BDEF56C115EA96077D3DE78C649C309

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1133 1800478b4-1800478d0 1134 1800478d2-1800478dc 1133->1134 1135 18004794b-180047955 1133->1135 1134->1135 1136 1800478de-1800478e8 1134->1136 1137 180047957-18004795a 1135->1137 1138 18004799e-1800479af 1135->1138 1136->1135 1141 1800478ea-1800478ed 1136->1141 1137->1138 1142 18004795c-180047999 call 18003e220 * 4 1137->1142 1139 1800479b1-1800479b8 1138->1139 1140 1800479cb-1800479cf 1138->1140 1139->1140 1143 1800479ba-1800479c6 call 18004a638 call 18003e220 1139->1143 1145 1800479d4-1800479df 1140->1145 1141->1135 1144 1800478ef-1800478f9 1141->1144 1142->1138 1143->1140 1148 180047911-18004791b 1144->1148 1149 1800478fb-1800478fe 1144->1149 1150 1800479e1-1800479e7 1145->1150 1151 1800479f3-1800479f8 1145->1151 1157 180047933-180047946 call 18003e220 * 2 1148->1157 1158 18004791d-180047920 1148->1158 1149->1148 1154 180047900-18004790c call 18003e220 call 18004aa94 1149->1154 1150->1151 1155 1800479e9-1800479ec 1150->1155 1159 180047a0d-180047a14 1151->1159 1160 1800479fa-180047a01 1151->1160 1154->1148 1155->1151 1165 1800479ee call 18003e220 1155->1165 1157->1135 1158->1157 1167 180047922-18004792e call 18003e220 call 18004aa28 1158->1167 1159->1145 1161 180047a16-180047a27 1159->1161 1160->1159 1168 180047a03-180047a06 1160->1168 1165->1151 1167->1157 1168->1159 1174 180047a08 call 18003e220 1168->1174 1174->1159
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap__free_lconv_mon__free_lconv_num_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2573795696-0
                                                                                                          • Opcode ID: 5a0bd3a4139776b5973723257e7de0a69dd99bb23b7eab651e3109ceedcb2a20
                                                                                                          • Instruction ID: 64e24b2416a1ca949d6f303a85acd9c423b1c112d23fea3cbc33af8ea2b513f7
                                                                                                          • Opcode Fuzzy Hash: 5a0bd3a4139776b5973723257e7de0a69dd99bb23b7eab651e3109ceedcb2a20
                                                                                                          • Instruction Fuzzy Hash: 6041113230298884FFD79F61D4903EE2354E78DBD8F059931BA4D4A2D6CF28CA99C355

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1293 18004a0f4-18004a131 1294 18004a133-18004a136 1293->1294 1295 18004a15d-18004a166 1293->1295 1298 18004a139-18004a13f 1294->1298 1296 18004a168-18004a16b 1295->1296 1297 18004a16f-18004a199 MultiByteToWideChar 1295->1297 1296->1297 1299 18004a1a2-18004a1ae 1297->1299 1300 18004a19b-18004a19d 1297->1300 1301 18004a141-18004a147 1298->1301 1302 18004a14d-18004a159 1298->1302 1304 18004a20e-18004a211 1299->1304 1305 18004a1b0-18004a1bd 1299->1305 1303 18004a398-18004a39c 1300->1303 1301->1298 1306 18004a149 1301->1306 1302->1295 1307 18004a15b 1302->1307 1309 18004a39f call 18003e5c0 1303->1309 1304->1300 1308 18004a213-18004a233 MultiByteToWideChar 1304->1308 1305->1304 1310 18004a1bf-18004a1cb 1305->1310 1306->1302 1307->1295 1311 18004a385-18004a38f 1308->1311 1312 18004a239-18004a25d LCMapStringW 1308->1312 1313 18004a3a4-18004a3bd 1309->1313 1314 18004a1f7 1310->1314 1315 18004a1cd-18004a1d4 1310->1315 1316 18004a396 1311->1316 1317 18004a391 call 18003e220 1311->1317 1312->1311 1318 18004a263-18004a26c 1312->1318 1321 18004a1f7 call 18003e168 1314->1321 1319 18004a1d6 1315->1319 1320 18004a1d9-18004a1ed call 18003f160 1315->1320 1316->1303 1317->1316 1323 18004a2a5-18004a2a7 1318->1323 1324 18004a26e-18004a273 1318->1324 1319->1320 1320->1300 1336 18004a1ef-18004a1f5 1320->1336 1326 18004a1fc-18004a202 1321->1326 1329 18004a310 1323->1329 1330 18004a2a9-18004a2b6 1323->1330 1324->1311 1328 18004a279-18004a27b 1324->1328 1326->1304 1327 18004a204 1326->1327 1332 18004a20a 1327->1332 1328->1311 1333 18004a281-18004a2a0 LCMapStringW 1328->1333 1334 18004a312-18004a315 1329->1334 1330->1329 1335 18004a2b8-18004a2c0 1330->1335 1332->1304 1333->1311 1334->1311 1337 18004a317-18004a336 LCMapStringW 1334->1337 1338 18004a2f7 1335->1338 1339 18004a2c2-18004a2c9 1335->1339 1336->1332 1341 18004a338-18004a34f 1337->1341 1342 18004a374-18004a37e 1337->1342 1340 18004a2f7 call 18003e168 1338->1340 1343 18004a2d5-18004a2e9 call 18003f160 1339->1343 1344 18004a2cb 1339->1344 1345 18004a2fc-18004a302 1340->1345 1346 18004a351-18004a35a 1341->1346 1347 18004a35c-18004a364 1341->1347 1342->1311 1348 18004a380 call 18003e220 1342->1348 1343->1311 1354 18004a2ef-18004a2f5 1343->1354 1344->1343 1345->1334 1352 18004a304 1345->1352 1353 18004a369-18004a372 WideCharToMultiByte 1346->1353 1347->1353 1348->1311 1355 18004a30a-18004a30e 1352->1355 1353->1342 1354->1355 1355->1334
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                                                                          • String ID:
                                                                                                          • API String ID: 1080698880-0
                                                                                                          • Opcode ID: 8f87ab9d2ae227485477a57223987bd8726c4cafbcef0a4fabf5341cba31a906
                                                                                                          • Instruction ID: 746fdc849fb7efc80f96b9087f0f4f5be30642e255885f1a6576107973598593
                                                                                                          • Opcode Fuzzy Hash: 8f87ab9d2ae227485477a57223987bd8726c4cafbcef0a4fabf5341cba31a906
                                                                                                          • Instruction Fuzzy Hash: 0381B732208B8886FBA69F2594803DA77D5F74E7E8F158615FA1943BD4EF78C7488308

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1356 180048408-180048429 1357 18004843e-180048441 1356->1357 1358 18004842b-18004842e 1356->1358 1359 180048446-18004844d 1357->1359 1360 180048443 1357->1360 1358->1357 1361 180048430-180048433 1358->1361 1362 180048464-18004847a call 180040ae0 1359->1362 1363 18004844f-18004845b call 1800408e4 call 180042888 1359->1363 1360->1359 1364 180048435 1361->1364 1365 180048437-180048439 1361->1365 1372 180048532-180048566 WideCharToMultiByte 1362->1372 1373 180048480-18004848c 1362->1373 1376 180048460-180048462 1363->1376 1364->1365 1366 1800484c8-1800484d7 1365->1366 1374 180048568-18004856c 1372->1374 1375 18004857b-180048584 GetLastError 1372->1375 1377 1800484d8-1800484db 1373->1377 1378 18004848e-180048491 1373->1378 1379 1800484a5-1800484bb call 1800408e4 * 2 1374->1379 1380 180048572-180048575 1374->1380 1375->1379 1383 18004858a-18004858d 1375->1383 1376->1366 1381 18004850d-180048510 1377->1381 1382 1800484dd-1800484e0 1377->1382 1378->1379 1384 180048493-180048496 1378->1384 1379->1366 1408 1800484bd-1800484c1 1379->1408 1386 180048518-18004851c 1380->1386 1388 180048577-180048579 1380->1388 1381->1386 1387 180048512 1381->1387 1389 1800484e2-1800484f5 call 1800408e4 call 180042888 1382->1389 1390 18004850b 1382->1390 1391 1800485a1-1800485b6 call 1800408e4 call 180042888 1383->1391 1392 18004858f-180048592 1383->1392 1384->1379 1393 180048498-1800484a0 call 18003ece0 1384->1393 1386->1365 1396 180048522-18004852d 1386->1396 1387->1386 1388->1386 1389->1376 1411 1800484fb-180048506 1389->1411 1390->1381 1391->1376 1410 1800485bc-1800485c7 1391->1410 1392->1391 1398 180048594-18004859c call 18003ece0 1392->1398 1393->1379 1396->1365 1398->1391 1408->1366 1410->1376 1411->1376
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 2295021086-0
                                                                                                          • Opcode ID: d8226484d9b045e3bf121a32930208bfe2de1e8e9735e94a0eea8d55c1e7fd26
                                                                                                          • Instruction ID: 9c22cb322589bbaecf03df9c4e1f5db85217bda39a9a5de2319d300efcf44f58
                                                                                                          • Opcode Fuzzy Hash: d8226484d9b045e3bf121a32930208bfe2de1e8e9735e94a0eea8d55c1e7fd26
                                                                                                          • Instruction Fuzzy Hash: 2251EA32601E4949FBE79F60C4C03EC26A0BF897ECF56C524FA4916AC5DF3886499748

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1412 1800442b4-1800442e3 GetStartupInfoW 1413 1800442e5 call 180042a74 1412->1413 1414 1800442ea-1800442f3 1413->1414 1415 1800442f5-1800442f8 1414->1415 1416 1800442fd-180044315 1414->1416 1417 180044568-180044585 1415->1417 1418 180044317 1416->1418 1419 18004435c-180044362 1416->1419 1420 18004431b-180044354 1418->1420 1421 180044368-180044370 1419->1421 1422 18004449c-18004449f 1419->1422 1420->1420 1424 180044356 1420->1424 1421->1422 1425 180044376-18004438c 1421->1425 1423 1800444a2-1800444ae 1422->1423 1426 1800444c1-1800444ea GetStdHandle 1423->1426 1427 1800444b0-1800444b5 1423->1427 1424->1419 1428 180044392 1425->1428 1429 180044419-18004441e 1425->1429 1432 180044539-18004453e 1426->1432 1433 1800444ec-1800444ef 1426->1433 1427->1426 1431 1800444b7-1800444bc 1427->1431 1430 180044399-18004439e 1428->1430 1429->1422 1434 180044420-180044425 1429->1434 1435 1800443a1 call 180042a74 1430->1435 1436 180044546-180044554 1431->1436 1432->1436 1433->1432 1437 1800444f1-1800444fc GetFileType 1433->1437 1438 180044427-18004442c 1434->1438 1439 18004448f-18004449a 1434->1439 1440 1800443a6-1800443a9 1435->1440 1436->1423 1441 18004455a-180044566 SetHandleCount 1436->1441 1437->1432 1442 1800444fe-180044508 1437->1442 1438->1439 1443 18004442e-180044433 1438->1443 1439->1422 1439->1434 1444 180044413 1440->1444 1445 1800443ab-1800443c6 1440->1445 1441->1417 1446 180044511-180044514 1442->1446 1447 18004450a-18004450f 1442->1447 1443->1439 1448 180044435-18004443a 1443->1448 1444->1429 1449 1800443c8 1445->1449 1450 180044409-18004440f 1445->1450 1451 18004451b-18004452d InitializeCriticalSectionAndSpinCount 1446->1451 1452 180044516 1446->1452 1447->1451 1453 18004444a-180044486 InitializeCriticalSectionAndSpinCount 1448->1453 1454 18004443c-180044448 GetFileType 1448->1454 1456 1800443cc-180044401 1449->1456 1450->1430 1457 180044411 1450->1457 1451->1415 1458 180044533-180044537 1451->1458 1452->1451 1453->1415 1455 18004448c 1453->1455 1454->1439 1454->1453 1455->1439 1456->1456 1459 180044403 1456->1459 1457->1429 1458->1436 1459->1450
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3473179607-2766056989
                                                                                                          • Opcode ID: 731d2ca942fb7059f98ccea79a0825b347f719a010229efa7715c3398953b345
                                                                                                          • Instruction ID: 7b13a2a208b59659a7ff2164eb285c9a59e6247728ec510e04abe0ab60cf6499
                                                                                                          • Opcode Fuzzy Hash: 731d2ca942fb7059f98ccea79a0825b347f719a010229efa7715c3398953b345
                                                                                                          • Instruction Fuzzy Hash: CE81B472200F8986EB968F14D88439937A1F748BB8F59C324EA7A477D1DF78C659C309

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1460 18004582c-180045853 1461 180045855-180045869 call 180040904 call 1800408e4 1460->1461 1462 18004586e-180045872 1460->1462 1479 18004592c 1461->1479 1464 180045915-180045921 call 180040904 call 1800408e4 1462->1464 1465 180045878-18004587e 1462->1465 1482 180045927 call 180042888 1464->1482 1465->1464 1468 180045884-1800458aa 1465->1468 1468->1464 1471 1800458ac-1800458ba 1468->1471 1472 1800458d0-1800458e2 call 180048e24 1471->1472 1473 1800458bc-1800458ce call 180040904 call 1800408e4 1471->1473 1485 1800458f5-180045907 call 1800408e4 call 180040904 1472->1485 1486 1800458e4-1800458ea 1472->1486 1473->1482 1483 18004592f-180045946 1479->1483 1482->1479 1493 18004590a-180045913 call 180048ecc 1485->1493 1489 1800458ec call 180045108 1486->1489 1491 1800458f1-1800458f3 1489->1491 1491->1493 1493->1483
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2315031519-0
                                                                                                          • Opcode ID: c62bc627254f1f1a9acb5995aa69af8956a7e938587757901c016c5564e10ee5
                                                                                                          • Instruction ID: 7682daf60427842ebd199fa13711cc73cf9a5fbc78c26fb93eb3438255fbe3e8
                                                                                                          • Opcode Fuzzy Hash: c62bc627254f1f1a9acb5995aa69af8956a7e938587757901c016c5564e10ee5
                                                                                                          • Instruction Fuzzy Hash: 7D310472310E8C86F7936F6598C13ED2650A7487E8F57C119FAA4177D3CE788A48C708

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1577 180043e2c-180043e64 1578 180043e66-180043e6c 1577->1578 1579 180043e6e-180043e71 1577->1579 1578->1578 1578->1579 1580 180043ea2 1579->1580 1581 180043e73-180043e76 1579->1581 1584 180043ea7 1580->1584 1582 180043e78-180043e7b 1581->1582 1583 180043e9b-180043ea0 1581->1583 1585 180043e94-180043e99 1582->1585 1586 180043e7d-180043e88 call 1800408e4 call 180042888 1582->1586 1587 180043eaa-180043eb4 1583->1587 1584->1587 1585->1584 1602 180043e8d-180043e8f 1586->1602 1589 180044075-180044078 1587->1589 1590 180043eba 1587->1590 1592 180044072 1589->1592 1593 18004407a-18004407d 1589->1593 1594 180043ec0-180043ec2 1590->1594 1592->1589 1593->1586 1596 180044083-1800440a0 call 180049afc 1593->1596 1597 180043fb6-180043fb9 1594->1597 1598 180043ec8-180043ece 1594->1598 1596->1602 1613 1800440a6-1800440c8 1596->1613 1597->1589 1601 180043fbf 1597->1601 1599 180043ed0 1598->1599 1600 180043f49-180043f4c 1598->1600 1604 180043ed2-180043ed5 1599->1604 1605 180043f3c-180043f3f 1599->1605 1606 180043f4e-180043f51 1600->1606 1607 180043f9b-180043f9f 1600->1607 1608 180043fc4-180043fc7 1601->1608 1609 1800440cb-1800440e1 1602->1609 1614 180043fa9-180043fb0 1604->1614 1615 180043edb-180043ede 1604->1615 1611 180043fa1-180043fa3 1605->1611 1612 180043f41-180043f47 1605->1612 1616 180043f53-180043f55 1606->1616 1617 180043f8d-180043f93 1606->1617 1607->1611 1620 180043fa5 1607->1620 1618 180043fc1 1608->1618 1619 180043fc9-180043fe0 call 180049e80 1608->1619 1611->1614 1612->1614 1613->1609 1614->1594 1614->1597 1621 180043f27-180043f2b 1615->1621 1622 180043ee0-180043ee2 1615->1622 1623 180043f57-180043f5a 1616->1623 1624 180043f80-180043f83 1616->1624 1617->1611 1626 180043f95-180043f99 1617->1626 1618->1608 1619->1586 1638 180043fe6-180043fea 1619->1638 1620->1614 1621->1611 1633 180043f2d-180043f3a 1621->1633 1627 180043f22-180043f25 1622->1627 1628 180043ee4-180043ee7 1622->1628 1629 180043f72-180043f75 1623->1629 1630 180043f5c-180043f5f 1623->1630 1624->1611 1632 180043f85-180043f8b 1624->1632 1626->1614 1627->1611 1634 180043f10-180043f14 1628->1634 1635 180043ee9-180043eec 1628->1635 1629->1611 1637 180043f77-180043f7e 1629->1637 1630->1586 1636 180043f65-180043f6b 1630->1636 1632->1614 1633->1614 1634->1611 1643 180043f1a-180043f1d 1634->1643 1639 180043f07-180043f0b 1635->1639 1640 180043eee-180043ef1 1635->1640 1636->1611 1641 180043f6d-180043f70 1636->1641 1637->1614 1642 180043fef-180043ff2 1638->1642 1639->1614 1640->1586 1644 180043ef3-180043ef6 1640->1644 1641->1614 1645 180043ff4-180043ff7 1642->1645 1646 180043fec 1642->1646 1643->1614 1644->1611 1647 180043efc-180043f02 1644->1647 1645->1586 1648 180043ffd-180044003 1645->1648 1646->1642 1647->1614 1648->1648 1649 180044005-18004401c call 180049d18 1648->1649 1652 180044028-18004403f call 180049d18 1649->1652 1653 18004401e-180044026 1649->1653 1656 180044041-180044049 1652->1656 1657 18004404b-180044062 call 180049d18 1652->1657 1653->1589 1656->1589 1657->1586 1660 180044068-180044070 1657->1660 1660->1589
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo_wsopen_s
                                                                                                          • String ID: UNICODE$UTF-16LE$UTF-8$ccs
                                                                                                          • API String ID: 2053332431-3573488595
                                                                                                          • Opcode ID: b0c4c6ed9e8498d35fe9303ea9063a51c90cfbb9c06f99b476d42cc90f5ed235
                                                                                                          • Instruction ID: 3e9b913e688f760b830cb86a69413b8bce1326bacd42ec6ba54fe81f9aa2ab57
                                                                                                          • Opcode Fuzzy Hash: b0c4c6ed9e8498d35fe9303ea9063a51c90cfbb9c06f99b476d42cc90f5ed235
                                                                                                          • Instruction Fuzzy Hash: DD711472E04A0C55FBF75A12A9867EA16E0675D7CCE17E024FE0A029C5DF38CB4C8389
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2959964966-0
                                                                                                          • Opcode ID: ca76609593e7968924802dd47909a67a3de79fc0893ea02630d952cda44f7c31
                                                                                                          • Instruction ID: b8706fcba3373454a4b01edf78d16520a1e85cc0d5fe777b1d3ba09b79c1032e
                                                                                                          • Opcode Fuzzy Hash: ca76609593e7968924802dd47909a67a3de79fc0893ea02630d952cda44f7c31
                                                                                                          • Instruction Fuzzy Hash: 0C41D936604E4852EBE64B2581C13EC37A0F7097DDF258605FBA5836C2CF74CAA9C784
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno_lseek_nolock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3948042459-0
                                                                                                          • Opcode ID: 5491721df6ad7ab657e95dd21b0d4c728b4e8247b75b654f02dc873897995978
                                                                                                          • Instruction ID: bdeca9385717e63bca4346382234fa7d175972a54972681b325d5814d0ceb23a
                                                                                                          • Opcode Fuzzy Hash: 5491721df6ad7ab657e95dd21b0d4c728b4e8247b75b654f02dc873897995978
                                                                                                          • Instruction Fuzzy Hash: 43213133200E8842F787AF2599C03EC2511A7887E9F1BC104FA140B2D3CF788A4AC718
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 113790786-0
                                                                                                          • Opcode ID: f6cddf33ec298a8bb8cbf7baaf3bba66f453517a4b756cab4bc748b5810b4bcf
                                                                                                          • Instruction ID: edbf6d34453fbc39e254c7b3028adf59088a67094ee2582bf57cf3f75258cf43
                                                                                                          • Opcode Fuzzy Hash: f6cddf33ec298a8bb8cbf7baaf3bba66f453517a4b756cab4bc748b5810b4bcf
                                                                                                          • Instruction Fuzzy Hash: 9421A471A01E8C81F6E7AB10E5843EE2264E74C7C8F16D425B646576E6DF38CA4CC74A
                                                                                                          APIs
                                                                                                          • _lock.LIBCMT ref: 00000001800403A9
                                                                                                            • Part of subcall function 000000018004660C: _amsg_exit.LIBCMT ref: 0000000180046636
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 00000001800403DC
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 00000001800403FA
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 000000018004043A
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 0000000180040454
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 0000000180040464
                                                                                                          • ExitProcess.KERNEL32 ref: 00000001800404F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DecodePointer$ExitProcess_amsg_exit_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3411037476-0
                                                                                                          • Opcode ID: 90629936087b4b343afb6f5e2ea20390e49e002a64f4209c8e454aa55673ad60
                                                                                                          • Instruction ID: 28dce3b8938bf884f7e9275428b3a2511fbaf5e224c98a8887a53a350d5d9406
                                                                                                          • Opcode Fuzzy Hash: 90629936087b4b343afb6f5e2ea20390e49e002a64f4209c8e454aa55673ad60
                                                                                                          • Instruction Fuzzy Hash: 5041BD71212F8885E6C28F11EC8439962A5F78CBCCF25C424FA5E537A5EF78C68D8709
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 9c7078870c8113ac2fa39057a7caf9cf7a186e07d7669db40971e880b171e245
                                                                                                          • Instruction ID: 88e291cd6d8539d56209442e2423bdf494ec1d3842b4b11067e362a5da303880
                                                                                                          • Opcode Fuzzy Hash: 9c7078870c8113ac2fa39057a7caf9cf7a186e07d7669db40971e880b171e245
                                                                                                          • Instruction Fuzzy Hash: 4321D032310D4C41FA976F15DA813ED2611AB48BF8F1B8B05FE340B2D3CEB88A45A358
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: e06bde92bf7a4f08831d8cf039223712935559a8b634ef27faa4aece7a856289
                                                                                                          • Instruction ID: 3623e0460e9e27de6361ba960c2d9fdc26985ee9637d6ca9ed7da609fcd3abb5
                                                                                                          • Opcode Fuzzy Hash: e06bde92bf7a4f08831d8cf039223712935559a8b634ef27faa4aece7a856289
                                                                                                          • Instruction Fuzzy Hash: 64212333210E4C46F697AF25D9C13ED2611AB88BE9F1BC114FA140B2D3CF788A49C758
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$BuffersErrorFileFlushLast__doserrno
                                                                                                          • String ID:
                                                                                                          • API String ID: 1845094721-0
                                                                                                          • Opcode ID: efec3c3d13410bf04e0dd30c0ef053db8f256237de7b4ac0eddf3cca2fd18b4a
                                                                                                          • Instruction ID: aae8da55411f6dd9c1530ed359ea5e4f4d8b6876908d31b57a3ddde22457d520
                                                                                                          • Opcode Fuzzy Hash: efec3c3d13410bf04e0dd30c0ef053db8f256237de7b4ac0eddf3cca2fd18b4a
                                                                                                          • Instruction Fuzzy Hash: 3D21F931701E8D41F6936FA598C83ED2651A7887D8F1BC528B615173E2CE788A8CD358
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$_amsg_exit_errno_getptd$FreeHeapSleep_lockmalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 2578750445-0
                                                                                                          • Opcode ID: 94a589883ec5155802fd95d7fab442aedf742fc852adba6379efa46134cd3324
                                                                                                          • Instruction ID: da64bb642503be74eb0f6c14831e4ed13401b41da4aced71e1065a25a4b3c3bf
                                                                                                          • Opcode Fuzzy Hash: 94a589883ec5155802fd95d7fab442aedf742fc852adba6379efa46134cd3324
                                                                                                          • Instruction Fuzzy Hash: 9351B132300E8846E7E69B24A4803EA77A1F348BC8F56C116FA4E473E7CE38C649C744
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
                                                                                                          • String ID:
                                                                                                          • API String ID: 517548149-0
                                                                                                          • Opcode ID: 162e3acb479bf9528d8707f072606d60b166762714a5c8eb78a8a61cfab57453
                                                                                                          • Instruction ID: 28af58077e327febc6153a716ebded174d2046a11fd0603b2a2b94e2c4208846
                                                                                                          • Opcode Fuzzy Hash: 162e3acb479bf9528d8707f072606d60b166762714a5c8eb78a8a61cfab57453
                                                                                                          • Instruction Fuzzy Hash: 31219532A04B8485EBA68F11B48039A77E4F78DFC8F498114FE8A07764EF38D695C709
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 3cad00805c535d9d6a24c2447e46d4ac982fe79615d762552acafacf46815b53
                                                                                                          • Instruction ID: 94c96575089f4780a32a9ec00bd264dd4655c24e9f54b770cefb0f1c2659e3b0
                                                                                                          • Opcode Fuzzy Hash: 3cad00805c535d9d6a24c2447e46d4ac982fe79615d762552acafacf46815b53
                                                                                                          • Instruction Fuzzy Hash: 6B110632A00E8C42F6976F2699C23DC2651A7487E9F27E518B516073D3CEB88E48C758
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432B2
                                                                                                          • FlsGetValue.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432C0
                                                                                                          • SetLastError.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180043318
                                                                                                            • Part of subcall function 0000000180042A74: Sleep.KERNEL32(?,?,?,00000001800432DB,?,?,?,00000001800408ED,?,?,?,?,000000018003E245), ref: 0000000180042AB9
                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432EC
                                                                                                          • free.LIBCMT ref: 000000018004330F
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0000000180043300
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 3106088686-0
                                                                                                          • Opcode ID: 6c9f45206866909c37ad9c1b1df65dd8d4f15302a450987df3cd1bb5765d3834
                                                                                                          • Instruction ID: e35cefd1ee5cff6cda42b7689ae65c05deeff37c9490ea75c646b2ce74ee25c0
                                                                                                          • Opcode Fuzzy Hash: 6c9f45206866909c37ad9c1b1df65dd8d4f15302a450987df3cd1bb5765d3834
                                                                                                          • Instruction Fuzzy Hash: 4B018830200F8886FFD79F6594C53A86261AB4D7D8F05C624FD25033D1EE38C68C8314
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_fileno_invalid_parameter_noinfomemcpy_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 897514287-0
                                                                                                          • Opcode ID: 9c77f83cd8700deaabc0fd9fd6977863926e76bbc046ac42a92e242d67ca67a7
                                                                                                          • Instruction ID: 0586abbaa753a26bf92c3da2f0c0844abfb432f7583a0abf359983cbd5339943
                                                                                                          • Opcode Fuzzy Hash: 9c77f83cd8700deaabc0fd9fd6977863926e76bbc046ac42a92e242d67ca67a7
                                                                                                          • Instruction Fuzzy Hash: 4B513431304A4895EAB79E2695007BB6B80B74DBE4F19C7217E6D57BD0CF36C69A8340
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$_lock$CountEnterInitializeLeaveSpin
                                                                                                          • String ID:
                                                                                                          • API String ID: 3451527041-0
                                                                                                          • Opcode ID: ad7bfc99954593bcf8eda28a1d2ef663cbe48e0c93a53522361127f56cae083a
                                                                                                          • Instruction ID: 8c218b1dd958de25de949e51088d6abf58d8baf781aaa410045e41d8f4ca076a
                                                                                                          • Opcode Fuzzy Hash: ad7bfc99954593bcf8eda28a1d2ef663cbe48e0c93a53522361127f56cae083a
                                                                                                          • Instruction Fuzzy Hash: 9351E672601F4886EBA28B50D4803ADA691F7987ECF068625FE6A033D5DF78C65DC705
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
                                                                                                          • String ID:
                                                                                                          • API String ID: 2574049805-0
                                                                                                          • Opcode ID: 4ff880635ef4d904e09ebc87325dda54b86b1ac69e38fcb8f2c0d3ea48b9a742
                                                                                                          • Instruction ID: eb1a6f5e6da6c3769f147ceaaaa7fc0fc70cae78f6684998a98c0054d036f7c8
                                                                                                          • Opcode Fuzzy Hash: 4ff880635ef4d904e09ebc87325dda54b86b1ac69e38fcb8f2c0d3ea48b9a742
                                                                                                          • Instruction Fuzzy Hash: CD41F472600F4C4AEBD69F29C4913EC36A0F748BD8F168215FA69473D5DE34CA55C788
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 307345228-0
                                                                                                          • Opcode ID: 93dcc5b94d4ecd0e86884504227929fb1291d854fb79cbca14ab971fb09c5493
                                                                                                          • Instruction ID: c1e8cdc11ca7ad10a2207395aac586f5b43039c7c9522db95887dc8847b2f22a
                                                                                                          • Opcode Fuzzy Hash: 93dcc5b94d4ecd0e86884504227929fb1291d854fb79cbca14ab971fb09c5493
                                                                                                          • Instruction Fuzzy Hash: 1F419432204F8486FB929F25A8407DA6395F78DBECF5A8611BE2D477D4DF38C5098708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_excf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3843346586-0
                                                                                                          • Opcode ID: 4fed85a8e9323bfe2c854ad3ef067d745824d256f9f05b55b1c983bcfd5a2ff9
                                                                                                          • Instruction ID: 35ab72a1ed03ce81a25cb5b39f41f12cf8ca01baf8c7fa63cc16a06614d8d2ce
                                                                                                          • Opcode Fuzzy Hash: 4fed85a8e9323bfe2c854ad3ef067d745824d256f9f05b55b1c983bcfd5a2ff9
                                                                                                          • Instruction Fuzzy Hash: 5041E432614E888AE752DB26E4813EEB771FBCD3C8F415325FA4956A58DF38D589CB00
                                                                                                          APIs
                                                                                                          • DecodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E64D
                                                                                                          • DecodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E65D
                                                                                                            • Part of subcall function 0000000180042B80: _errno.LIBCMT ref: 0000000180042B89
                                                                                                            • Part of subcall function 0000000180042B80: _invalid_parameter_noinfo.LIBCMT ref: 0000000180042B94
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6DB
                                                                                                            • Part of subcall function 0000000180042AF8: realloc.LIBCMT ref: 0000000180042B23
                                                                                                            • Part of subcall function 0000000180042AF8: Sleep.KERNEL32(?,?,00000000,000000018003E6CB,?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 0000000180042B3F
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6EB
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6F8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1909145217-0
                                                                                                          • Opcode ID: ed15b638c86beb6079fb653881b7bedfcb1da94e35fa47f475b2029b95edd674
                                                                                                          • Instruction ID: fe7b83a0f1e081e7fa5e6d38d200593cd4bdb274e8300509f1d988dc7ce839eb
                                                                                                          • Opcode Fuzzy Hash: ed15b638c86beb6079fb653881b7bedfcb1da94e35fa47f475b2029b95edd674
                                                                                                          • Instruction Fuzzy Hash: B521A130302B8881EA939B52E9893CAA352B34EBD4F45C825F91E17394DE78C68D8344
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 04538ce0f69410465c08cf912922deca18a28768c91d40277fbb7ad585d34a5d
                                                                                                          • Instruction ID: 3fb9fc9a06773a5ddc4cf9db8930bc32603d4213745492d31301100f49cfba50
                                                                                                          • Opcode Fuzzy Hash: 04538ce0f69410465c08cf912922deca18a28768c91d40277fbb7ad585d34a5d
                                                                                                          • Instruction Fuzzy Hash: 730181B2A01E4C41FE976B55C8C13EC22519B98BE9FA7CB05F629063D2CFB846089355
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: powf
                                                                                                          • String ID: ..\..\Cooking\src\ConvexMeshBuilder.cpp$Failed to rebuild Opcode model.$Failed to refit Opcode model.
                                                                                                          • API String ID: 3445610689-3682976713
                                                                                                          • Opcode ID: 216dec962e8dca91ec4070bef38bf642e1f4696c0a72cbfcd53967bfc60aac4b
                                                                                                          • Instruction ID: c1c056e1c85f343c2078a2337025b71bb37fd292796a6b4142674db4036b91a6
                                                                                                          • Opcode Fuzzy Hash: 216dec962e8dca91ec4070bef38bf642e1f4696c0a72cbfcd53967bfc60aac4b
                                                                                                          • Instruction Fuzzy Hash: A5E14233A347C89AD342CB3694853E9B360FF6E789F299716EB04321B5DB2161D5AF10
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                                                          • String ID: -
                                                                                                          • API String ID: 485257318-2547889144
                                                                                                          • Opcode ID: 7fdfd41007377c7044378e94245d290bf8d3290ad409f6aff9913dfa4249c632
                                                                                                          • Instruction ID: d709b449ce76c0cccf1e9d4ca559e2f814d34352179fa1e3acc4947a0398de61
                                                                                                          • Opcode Fuzzy Hash: 7fdfd41007377c7044378e94245d290bf8d3290ad409f6aff9913dfa4249c632
                                                                                                          • Instruction Fuzzy Hash: 5831F832308E8849EBA29A21E4807DDB7A0BB49BD9F55C211FF9807BC5DF38C649C704
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                                          • String ID: 1
                                                                                                          • API String ID: 2819658684-2212294583
                                                                                                          • Opcode ID: acab422b16e29b316407dfade680dd80396a7f151f61521eb08063fae4db2bda
                                                                                                          • Instruction ID: 3afd2d037a64dffeabbd375ce9f5099401c357d53f3d192c0fa9e8baf7547702
                                                                                                          • Opcode Fuzzy Hash: acab422b16e29b316407dfade680dd80396a7f151f61521eb08063fae4db2bda
                                                                                                          • Instruction Fuzzy Hash: 8C21C232719AC895F7979B2484903EC6A9097197C8F9BC071B64D06383DE2ACB4DC719
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
                                                                                                          • String ID: bad allocation
                                                                                                          • API String ID: 2837191506-2104205924
                                                                                                          • Opcode ID: 69166dead89ba0001818fcb42f863f8f744a8727467665a40b2d329f3b4ae9c4
                                                                                                          • Instruction ID: 2638e90aacf5b7bd257e9f3c7290f5987344553ab20e9d5bcdf450cefdde47fc
                                                                                                          • Opcode Fuzzy Hash: 69166dead89ba0001818fcb42f863f8f744a8727467665a40b2d329f3b4ae9c4
                                                                                                          • Instruction Fuzzy Hash: FF012971210F4D95FAA2EF10FC913E923A1AB4C3C8F999515B98A466A6EF78C34CC744
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(?,?,000000FF,00000001800401F9,?,?,00000028,000000018003E1B1,?,?,00000000,0000000180042A24,?,?,?,0000000180046585), ref: 00000001800401BF
                                                                                                          • GetProcAddress.KERNEL32(?,?,000000FF,00000001800401F9,?,?,00000028,000000018003E1B1,?,?,00000000,0000000180042A24,?,?,?,0000000180046585), ref: 00000001800401D4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 1646373207-1276376045
                                                                                                          • Opcode ID: ba0dafc19b2472185031fd18bc234a06f9b3256a42d53cff56055289a2376332
                                                                                                          • Instruction ID: a0660a350e574b67e0b4226d0f2eee7d3bf1d40f10e0bb7c7f0877cdf3d5dc59
                                                                                                          • Opcode Fuzzy Hash: ba0dafc19b2472185031fd18bc234a06f9b3256a42d53cff56055289a2376332
                                                                                                          • Instruction Fuzzy Hash: 47E01230701B0841FF9B5B90ACE87E812905B4DB85F49D428A81E163A0DE78C7CDC354
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinf$wprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 2107656780-0
                                                                                                          • Opcode ID: 382b214eebf19062cad19f456cb08a0201fd66ced005d341dfe06ad299dadf82
                                                                                                          • Instruction ID: 46b4470296fbe892be20eddff3f83e40b80dd16ede03d11ccee520d7224549a9
                                                                                                          • Opcode Fuzzy Hash: 382b214eebf19062cad19f456cb08a0201fd66ced005d341dfe06ad299dadf82
                                                                                                          • Instruction Fuzzy Hash: D5819632A24B8C85E253973754823EAB350BF6E3D5F2ED712FE4436672DB3592859700
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3160392742-0
                                                                                                          • Opcode ID: 710fe8378ab7627c6d3ad517a7fb43d291aca31b161ca0839560dead9768729b
                                                                                                          • Instruction ID: 1cead7b32d2bbf2f5b55d1c3a91411fd1ac8757cce8477ee880dc762cf88697a
                                                                                                          • Opcode Fuzzy Hash: 710fe8378ab7627c6d3ad517a7fb43d291aca31b161ca0839560dead9768729b
                                                                                                          • Instruction Fuzzy Hash: B961A332A20BCC89F3539B3598413E9B390FF6D399F59D316F958637A1EB3496968300
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 27599310-0
                                                                                                          • Opcode ID: 3ba312c050f11dc89975966b9274c87d68241d0575a534c57e7272571b709c94
                                                                                                          • Instruction ID: 3bc55bf60f611b24502ee0385f2e896cb3150c86a8d65ec0ab32753a95d692e4
                                                                                                          • Opcode Fuzzy Hash: 3ba312c050f11dc89975966b9274c87d68241d0575a534c57e7272571b709c94
                                                                                                          • Instruction Fuzzy Hash: BA519931A04F4882F6EB8B1494C43E96791F78D7CCF66C519F95A026A4EF39DA4DC30A
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fileno_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 3179357039-0
                                                                                                          • Opcode ID: d41cd86fc7fb8144f4059a54d214e4fa40f97208075d2dc81462a2ea984e8e8f
                                                                                                          • Instruction ID: d0906d9fb1a41af227b7a35f2f9a52febfb977d410d2cbb6bbfff6933d0bdc86
                                                                                                          • Opcode Fuzzy Hash: d41cd86fc7fb8144f4059a54d214e4fa40f97208075d2dc81462a2ea984e8e8f
                                                                                                          • Instruction Fuzzy Hash: 6B51AE32200B8D86EBB79E25C4453AB3791E788BD8F5AC115EE45073D5CE76CA49C340
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fileno_flush_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 329365992-0
                                                                                                          • Opcode ID: 698076d28cb656be0e290576a6c6d4183abae3acb9cc80cd1dacd601588005bc
                                                                                                          • Instruction ID: 994570d0ed5c695223296e2820c58eafbc39b0a3d3290f0a7fd1d0bd978d184a
                                                                                                          • Opcode Fuzzy Hash: 698076d28cb656be0e290576a6c6d4183abae3acb9cc80cd1dacd601588005bc
                                                                                                          • Instruction Fuzzy Hash: 3041383130864846EEFB8E26A5443FFA781B74CBD4F2AC224BE55477D5DE39C64A8300
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo$_getptd
                                                                                                          • String ID:
                                                                                                          • API String ID: 1297830140-0
                                                                                                          • Opcode ID: 685b8ff2d911154aa2a8e8b67757949be9fab10ec942415c646d9afbcf8df801
                                                                                                          • Instruction ID: 7cefe7ca653a2f4658f3ee0a3df96f0f0be2bf27072e95f2b595b8178f122df2
                                                                                                          • Opcode Fuzzy Hash: 685b8ff2d911154aa2a8e8b67757949be9fab10ec942415c646d9afbcf8df801
                                                                                                          • Instruction Fuzzy Hash: 2441B132204B888AEB92EF15D5C43DD77A0F788BD5F568121EB8A43B92DF38C559C704
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$CountEnterInitializeSpin_amsg_exit_lockfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 3786353176-0
                                                                                                          • Opcode ID: 2d8fe9b17452f9be50c8f4dde2f5c65ad41ce5bf3704b10e52e00b94b0c4d927
                                                                                                          • Instruction ID: 77d012aec7b7a8e0eae38a5513b7aa1e5a3cf52bfde04b3ae6aefb7f7a7b0724
                                                                                                          • Opcode Fuzzy Hash: 2d8fe9b17452f9be50c8f4dde2f5c65ad41ce5bf3704b10e52e00b94b0c4d927
                                                                                                          • Instruction Fuzzy Hash: BC419132611F8882F7969B15E8803AC7761F758BD8F16C515EA590B2F1DF38CA89C748
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2819658684-0
                                                                                                          • Opcode ID: 99ea2aa7fa037c728c670b1af3ab4c704a45c8a6972333f03af08050f1a032be
                                                                                                          • Instruction ID: a8714d15938ca0f6a90d651474b82c1258147739466bb9e11812dd49b4ea1a94
                                                                                                          • Opcode Fuzzy Hash: 99ea2aa7fa037c728c670b1af3ab4c704a45c8a6972333f03af08050f1a032be
                                                                                                          • Instruction Fuzzy Hash: B921C335614A8A85FBA3AB21A8013AF6391B74CBC4F06D421BA8987B85DF3DC705C744
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _amsg_exit$_getptd_lockfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 2148533958-0
                                                                                                          • Opcode ID: 448ee291d70af40f8b290fc170a3ec04642eda76fc7755001fed3b988956531a
                                                                                                          • Instruction ID: 03751925d89ad7c75a090659d8e6fec9e03ae648af79c615cbbbc49a299d30f7
                                                                                                          • Opcode Fuzzy Hash: 448ee291d70af40f8b290fc170a3ec04642eda76fc7755001fed3b988956531a
                                                                                                          • Instruction Fuzzy Hash: F9110031215E4882EAD69B51E5817E973A4F78C7C8F499026FA4D037A6DF38C658CB05
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalDeleteSection$Freefree
                                                                                                          • String ID:
                                                                                                          • API String ID: 1250194111-0
                                                                                                          • Opcode ID: 9228b09e253a007911eda0d127ec13b25624cc88dbbd8a24fc5e966267fe7591
                                                                                                          • Instruction ID: 7a905e3c905827164463eee99df514b0c51316a8045c2e4bb92215e5cfa9d33c
                                                                                                          • Opcode Fuzzy Hash: 9228b09e253a007911eda0d127ec13b25624cc88dbbd8a24fc5e966267fe7591
                                                                                                          • Instruction Fuzzy Hash: 5011A731A41E88CAFFE68F11F4803987360F799BE8F598216F659022B5DF38C68D8705
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
                                                                                                          • String ID:
                                                                                                          • API String ID: 594724896-0
                                                                                                          • Opcode ID: 68e91f0215962c8046d3153dc38de0d0fe5a82dc01a661f0b9ce8fe4bd2a4dd0
                                                                                                          • Instruction ID: 0c0a23507bb2629b1bc646a7cbb6b0bd2226b194344c5b0705f97f05c29633ea
                                                                                                          • Opcode Fuzzy Hash: 68e91f0215962c8046d3153dc38de0d0fe5a82dc01a661f0b9ce8fe4bd2a4dd0
                                                                                                          • Instruction Fuzzy Hash: 53119435505E4892E6928B59E8C43DD7760F7C8BD8F22C225FA6A433B5CF79C649C708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _amsg_exit_getptd$_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3670291111-0
                                                                                                          • Opcode ID: 1e2951db7288fe683079fa74c1d0abc9f5b6e3ca7d7c7624e94539af6c24109d
                                                                                                          • Instruction ID: 30bf2c9c459df01ed59fad58da7d5b88ae189090fbb2b18f494d1813002e01c0
                                                                                                          • Opcode Fuzzy Hash: 1e2951db7288fe683079fa74c1d0abc9f5b6e3ca7d7c7624e94539af6c24109d
                                                                                                          • Instruction Fuzzy Hash: 3EF0187170180881F6D6AB5184817ED2361E79C7C8F0A9175FA0D073D3DE24875CC719
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinfwprintf
                                                                                                          • String ID: Cant normalize ZERO vector
                                                                                                          • API String ID: 478498997-1862362117
                                                                                                          • Opcode ID: 8f3b28573348b3f5bc6031dba9d50d39b873ffff9a8f37479b0f46ab6967f4a8
                                                                                                          • Instruction ID: f98a87a50659f58f53137574a4a326717961e7e6fcb01f50f0ee04a1c3ccac6a
                                                                                                          • Opcode Fuzzy Hash: 8f3b28573348b3f5bc6031dba9d50d39b873ffff9a8f37479b0f46ab6967f4a8
                                                                                                          • Instruction Fuzzy Hash: 08028633924B888AD352CB3790856AAB760FFAE3D4F299702FE44727B5DB35D5449B00
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.2171387112.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.2171351755.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171430395.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171454307.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171473553.000000018005E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171491825.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171514098.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171537615.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.2171556581.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _ctrlfp$_exception_enabled_raise_excf_set_statfp
                                                                                                          • String ID: !$asinf
                                                                                                          • API String ID: 3072139147-2917828882
                                                                                                          • Opcode ID: ff56a0d4b1c6a47029269032c783d636fad6bda69c86f508603d91954b0104b9
                                                                                                          • Instruction ID: d0c98440cba4b73ae54bff3046531fc7f845b546b7e426e5b618ba2336869eec
                                                                                                          • Opcode Fuzzy Hash: ff56a0d4b1c6a47029269032c783d636fad6bda69c86f508603d91954b0104b9
                                                                                                          • Instruction Fuzzy Hash: C051AA329246CC86E2A3C73BA4813E6B750AFAD3C5F29C705F940756B5DF2A91995F00

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:0.2%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:0%
                                                                                                          Total number of Nodes:97
                                                                                                          Total number of Limit Nodes:5
                                                                                                          execution_graph 20323 180049ee4 63 API calls 3 library calls 20345 180040170 5 API calls _DllMainCRTStartup 20325 1800010f0 62 API calls _Ref_count 20348 180005370 closesocket 20310 18004d074 CloseHandle 20349 18004d574 LeaveCriticalSection LeaveCriticalSection _freefls _fflush_nolock 20311 18004d47e 65 API calls 4 library calls 20326 180043d00 91 API calls 20327 180018300 119 API calls 2 library calls 20287 18003e408 64 API calls 2 library calls 20353 180040b84 64 API calls _cftof_l 20289 18004ce10 70 API calls 3 library calls 20293 18004d416 LeaveCriticalSection fwprintf$fin$0 20332 18001a120 89 API calls 20334 18003f124 61 API calls _getptd 20269 18002f2b0 20270 18002f2bd 20269->20270 20271 18002f331 20270->20271 20273 18002f110 20270->20273 20274 18002f122 20273->20274 20276 18002f145 20273->20276 20274->20276 20277 1800015b0 20274->20277 20276->20271 20278 1800015ca 20277->20278 20279 1800015de 20277->20279 20278->20276 20280 18000161b 20279->20280 20282 1800014d0 9 API calls 20279->20282 20280->20276 20282->20280 20296 180013830 72 API calls 20297 180009a30 8 API calls _cftoe_l 20355 18004d5bf LeaveCriticalSection LeaveCriticalSection LeaveCriticalSection _freefls$fin$0 _freefls 20317 18002f4c0 102 API calls 20337 18002f340 100 API calls _cftoe_l 20298 180019c40 99 API calls 20357 180019dc0 76 API calls 20318 1800014c0 DeleteCriticalSection 20359 180042bbc RtlUnwindEx _cinit 20300 180046650 63 API calls _getptd 20340 180019f50 62 API calls 20192 180040054 20194 18004007a 20192->20194 20193 180040082 20194->20193 20196 1800400b7 20194->20196 20200 18003ff00 20194->20200 20196->20193 20198 18003ff00 117 API calls 20196->20198 20199 1800400fc 20196->20199 20197 18003ff00 117 API calls 20197->20193 20198->20199 20199->20193 20199->20197 20201 18003ff12 20200->20201 20202 18003ff8f 20200->20202 20247 180040824 HeapCreate 20201->20247 20204 18003ff93 20202->20204 20205 18003ffe0 20202->20205 20210 18003ffca 20204->20210 20226 18003ff1b 20204->20226 20261 180044588 62 API calls free 20204->20261 20206 18004003b 20205->20206 20209 18003ffe5 powf 20205->20209 20206->20226 20268 180043484 63 API calls _freefls 20206->20268 20265 180042a74 61 API calls __onexitinit 20209->20265 20210->20226 20264 1800431c8 64 API calls free 20210->20264 20212 18003ff27 _RTC_Initialize 20215 18003ff2b 20212->20215 20225 18003ff37 GetCommandLineA 20212->20225 20253 18004087c HeapDestroy 20215->20253 20216 18003fff9 20219 180040005 FlsSetValue 20216->20219 20216->20226 20217 18003ffc0 20262 1800431c8 64 API calls free 20217->20262 20222 180040031 20219->20222 20223 18004001b 20219->20223 20267 18003e220 61 API calls _errno 20222->20267 20266 1800431f0 61 API calls 3 library calls 20223->20266 20224 18003ffc5 20263 18004087c HeapDestroy 20224->20263 20254 180045ffc 66 API calls 2 library calls 20225->20254 20226->20196 20231 180040022 GetCurrentThreadId 20231->20226 20232 18003ff49 20255 1800442b4 68 API calls __onexitinit 20232->20255 20233 18003ff7d 20233->20226 20235 18003ff55 20236 18003ff59 20235->20236 20237 18003ff60 20235->20237 20256 1800431c8 64 API calls free 20236->20256 20257 180045f04 76 API calls 3 library calls 20237->20257 20240 18003ff65 20241 18003ff79 20240->20241 20258 180045c04 75 API calls 5 library calls 20240->20258 20241->20233 20260 180044588 62 API calls free 20241->20260 20244 18003ff6e 20244->20241 20259 1800402d0 72 API calls 2 library calls 20244->20259 20245 18003ff8d 20245->20236 20248 18003ff17 20247->20248 20249 18004084c GetVersion 20247->20249 20248->20226 20252 1800434c4 69 API calls 3 library calls 20248->20252 20250 180040856 HeapSetInformation 20249->20250 20251 180040870 20249->20251 20250->20251 20251->20248 20252->20212 20253->20226 20254->20232 20255->20235 20256->20215 20257->20240 20258->20244 20259->20241 20260->20245 20261->20217 20262->20224 20263->20210 20264->20226 20265->20216 20266->20231 20267->20233 20268->20226 20361 18003e5e0 62 API calls __onexitinit 20307 180005260 11 API calls 2 library calls 20365 1800053e0 send

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 0000000180040824: HeapCreate.KERNELBASE ref: 000000018004083A
                                                                                                            • Part of subcall function 0000000180040824: GetVersion.KERNEL32 ref: 000000018004084C
                                                                                                            • Part of subcall function 0000000180040824: HeapSetInformation.KERNEL32 ref: 000000018004086A
                                                                                                          • _RTC_Initialize.LIBCMT ref: 000000018003FF32
                                                                                                          • GetCommandLineA.KERNEL32 ref: 000000018003FF37
                                                                                                            • Part of subcall function 0000000180045FFC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 0000000180046015
                                                                                                            • Part of subcall function 0000000180045FFC: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 000000018004606C
                                                                                                            • Part of subcall function 0000000180045FFC: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 00000001800460A7
                                                                                                            • Part of subcall function 0000000180045FFC: free.LIBCMT ref: 00000001800460B4
                                                                                                            • Part of subcall function 0000000180045FFC: FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,000000018003FF49), ref: 00000001800460BF
                                                                                                            • Part of subcall function 00000001800442B4: GetStartupInfoW.KERNEL32 ref: 00000001800442D5
                                                                                                          • __setargv.LIBCMT ref: 000000018003FF60
                                                                                                          • _cinit.LIBCMT ref: 000000018003FF74
                                                                                                            • Part of subcall function 00000001800431C8: FlsFree.KERNEL32(?,?,?,?,000000018003FFDE), ref: 00000001800431D7
                                                                                                            • Part of subcall function 00000001800431C8: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000018003FFDE), ref: 00000001800464B7
                                                                                                            • Part of subcall function 00000001800431C8: free.LIBCMT ref: 00000001800464C0
                                                                                                            • Part of subcall function 00000001800431C8: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000018003FFDE), ref: 00000001800464E7
                                                                                                            • Part of subcall function 0000000180042A74: Sleep.KERNEL32(?,?,?,00000001800432DB,?,?,?,00000001800408ED,?,?,?,?,000000018003E245), ref: 0000000180042AB9
                                                                                                          • FlsSetValue.KERNEL32 ref: 000000018004000E
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0000000180040022
                                                                                                          • free.LIBCMT ref: 0000000180040031
                                                                                                            • Part of subcall function 000000018003E220: HeapFree.KERNEL32(?,?,?,000000018000110D), ref: 000000018003E236
                                                                                                            • Part of subcall function 000000018003E220: _errno.LIBCMT ref: 000000018003E240
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentInfoInformationInitializeLineSleepStartupThreadValueVersion__setargv_cinit_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2481119767-0
                                                                                                          • Opcode ID: 61b5e00b11298625462c404e981e4dbee0cdad509bc41096663f8cfabbcd0743
                                                                                                          • Instruction ID: aa315cb78357cfe07c34d30648f785c9cd846825b8d2e9133f4b691ac97a99c6
                                                                                                          • Opcode Fuzzy Hash: 61b5e00b11298625462c404e981e4dbee0cdad509bc41096663f8cfabbcd0743
                                                                                                          • Instruction Fuzzy Hash: C3314C30200A0D89FAF7777059827FA12959F5D3D8F37D534B919852D3EE29874C836A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 70 180040824-18004084a HeapCreate 71 180040875-180040879 70->71 72 18004084c-180040854 GetVersion 70->72 73 180040856-18004086a HeapSetInformation 72->73 74 180040870 72->74 73->74 74->71
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Heap$CreateInformationVersion
                                                                                                          • String ID:
                                                                                                          • API String ID: 3563531100-0
                                                                                                          • Opcode ID: e32ab0bd0fee94bccc68f32d9a077722b0d5913c979a1ba73cc683a210d046bc
                                                                                                          • Instruction ID: 988e22e6e5946a36f70c9e45e8ed652961c4ed90b6ce8b9843ec7a251a3b24ee
                                                                                                          • Opcode Fuzzy Hash: e32ab0bd0fee94bccc68f32d9a077722b0d5913c979a1ba73cc683a210d046bc
                                                                                                          • Instruction Fuzzy Hash: 70E09274611F8882F7C69710AC897D52261B79C3C8FA18418F94A42B64DF3CC2CD8708

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 294 180044774-1800447bc call 18003f160 297 1800447c5-1800447c8 294->297 298 1800447be-1800447c0 294->298 300 1800447e9-18004481f 297->300 301 1800447ca-1800447dc call 180040904 call 1800408e4 call 180042888 297->301 299 180044eaa-180044ed3 call 18003e5c0 298->299 303 180044827-18004482e 300->303 304 180044821-180044825 300->304 317 1800447e1-1800447e4 301->317 303->301 308 180044830-180044836 303->308 304->303 304->308 310 180044845-18004484e call 180048318 308->310 311 180044838-180044840 call 180048148 308->311 318 180044854-180044865 310->318 319 180044b1e-180044b2f 310->319 311->310 317->299 318->319 322 18004486b-18004489b call 18004332c GetConsoleMode 318->322 320 180044b35-180044b3d 319->320 321 180044e33-180044e4f WriteFile 319->321 324 180044b43-180044b46 320->324 325 180044c0e-180044c12 320->325 326 180044e55-180044e5b 321->326 327 180044b08-180044b10 GetLastError 321->327 322->319 334 1800448a1-1800448a3 322->334 329 180044e69-180044e7f 324->329 330 180044b4c 324->330 332 180044c18-180044c1b 325->332 333 180044cf0-180044cf3 325->333 331 180044e01-180044e03 326->331 327->331 336 180044e81-180044e86 329->336 337 180044e8c-180044e9f call 1800408e4 call 180040904 329->337 335 180044b4f-180044b5b 330->335 338 180044ea4-180044ea8 331->338 339 180044e09-180044e0b 331->339 332->329 341 180044c21 332->341 333->329 340 180044cf9 333->340 343 1800448a5-1800448a8 334->343 344 1800448ae-1800448c2 GetConsoleCP 334->344 345 180044b5d-180044b66 335->345 336->298 336->337 337->317 338->299 339->329 347 180044e0d-180044e10 339->347 348 180044cff-180044d04 340->348 342 180044c26-180044c32 341->342 349 180044c34-180044c3d 342->349 343->319 343->344 350 180044b15-180044b19 344->350 351 1800448c8-1800448cb 344->351 352 180044b68-180044b71 345->352 353 180044b8f-180044bd3 WriteFile 345->353 355 180044e12-180044e24 call 1800408e4 call 180040904 347->355 356 180044e5d-180044e64 call 180040924 347->356 357 180044d06-180044d0f 348->357 358 180044c71-180044cb5 WriteFile 349->358 359 180044c3f-180044c4c 349->359 350->339 361 180044a55-180044a59 351->361 362 1800448d1-1800448f0 351->362 363 180044b73-180044b7b 352->363 364 180044b7e-180044b8d 352->364 353->327 365 180044bd9-180044bef 353->365 355->317 356->317 368 180044d11-180044d1e 357->368 369 180044d40-180044d88 WideCharToMultiByte 357->369 358->327 374 180044cbb-180044cd1 358->374 372 180044c5d-180044c6f 359->372 373 180044c4e-180044c59 359->373 379 180044a61-180044a7d 361->379 380 180044a5b-180044a5f 361->380 376 180044912-18004491c call 1800483c0 362->376 377 1800448f2-180044910 362->377 363->364 364->345 364->353 365->331 378 180044bf5-180044c03 365->378 383 180044d20-180044d28 368->383 384 180044d2c-180044d3e 368->384 370 180044d8e 369->370 371 180044e29-180044e31 GetLastError 369->371 389 180044d90-180044dcd WriteFile 370->389 385 180044dfc 371->385 372->349 372->358 373->372 374->331 386 180044cd7-180044ce5 374->386 404 180044952-180044958 376->404 405 18004491e-18004492b 376->405 387 18004495b-180044968 call 18004a05c 377->387 378->335 390 180044c09 378->390 392 180044a84-180044a88 379->392 380->379 391 180044a7f 380->391 383->384 384->357 384->369 385->331 386->342 400 180044ceb 386->400 410 18004496e-1800449ab WideCharToMultiByte 387->410 411 180044aff-180044b03 387->411 398 180044dcf-180044dd6 389->398 399 180044dda-180044de0 GetLastError 389->399 390->331 391->392 394 180044a90-180044a9f call 180049e88 392->394 395 180044a8a-180044a8e 392->395 394->327 416 180044aa1-180044aa7 394->416 395->394 402 180044aca 395->402 398->389 407 180044dd8 398->407 408 180044de2-180044de5 399->408 400->331 413 180044acf-180044ad7 402->413 404->387 414 180044931-180044947 call 18004a05c 405->414 415 180044ade-180044af6 405->415 407->408 408->385 412 180044de7-180044df6 408->412 410->411 419 1800449b1-1800449e0 WriteFile 410->419 411->331 412->348 412->385 413->411 417 180044ad9 413->417 414->411 424 18004494d-180044950 414->424 415->411 416->402 420 180044aa9-180044ac2 call 180049e88 416->420 417->351 419->327 421 1800449e6-1800449f4 419->421 420->327 428 180044ac4-180044ac6 420->428 421->411 425 1800449fa-180044a04 421->425 424->410 425->413 427 180044a0a-180044a3c WriteFile 425->427 427->327 429 180044a42-180044a47 427->429 428->402 429->411 430 180044a4d-180044a53 429->430 430->413
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                                                          • String ID: U
                                                                                                          • API String ID: 3902385426-4171548499
                                                                                                          • Opcode ID: 2d5ce46ed2b1d32d86571561728c0a6fb84dd56a645abb6e696f7c4412cbdee7
                                                                                                          • Instruction ID: a924f4dc1a727bc392aaaba263266b47709fba0b4cecbfed23009677402f7412
                                                                                                          • Opcode Fuzzy Hash: 2d5ce46ed2b1d32d86571561728c0a6fb84dd56a645abb6e696f7c4412cbdee7
                                                                                                          • Instruction Fuzzy Hash: 3312F633204E4986EBA28F25D4C43EA67A1F38CBC8F568115FA494BA95DF7DC64DC708

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1243 180040580-1800405bc call 180040554 1246 1800405c2-1800405cd call 180046e70 1243->1246 1247 1800407b0-1800407dc call 18003e5c0 1243->1247 1252 180040748-180040759 GetStdHandle 1246->1252 1253 1800405d3-1800405dd call 180046e70 1246->1253 1252->1247 1254 18004075b-18004075f 1252->1254 1259 1800405df-1800405e6 1253->1259 1260 1800405ec-1800405f2 1253->1260 1254->1247 1256 180040761-180040763 1254->1256 1258 180040768-180040770 1256->1258 1261 180040772-180040781 1258->1261 1262 180040783-1800407aa call 1800469e0 WriteFile 1258->1262 1259->1252 1259->1260 1260->1247 1263 1800405f8-18004061b call 180046e04 1260->1263 1261->1258 1261->1262 1262->1247 1268 180040735-180040747 call 1800427e4 1263->1268 1269 180040621-180040645 GetModuleFileNameW 1263->1269 1268->1252 1270 180040647-18004065a call 180046e04 1269->1270 1271 180040671-180040680 call 180046de8 1269->1271 1270->1271 1278 18004065c-180040670 call 1800427e4 1270->1278 1279 180040682-1800406b2 call 180046de8 call 180046d18 1271->1279 1280 1800406c9-1800406dd call 180046c90 1271->1280 1278->1271 1279->1280 1293 1800406b4-1800406c8 call 1800427e4 1279->1293 1287 1800406df-1800406ef call 180046c90 1280->1287 1288 180040720-180040734 call 1800427e4 1280->1288 1297 1800406f1-180040706 call 180046a88 1287->1297 1298 18004070b-18004071f call 1800427e4 1287->1298 1288->1268 1293->1280 1297->1247 1298->1288
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
                                                                                                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                                          • API String ID: 2183313154-4022980321
                                                                                                          • Opcode ID: ba61b9740d2fabcbb053f7a8c1a04480db4f8b8fe58e62101f9bba5b1f63e096
                                                                                                          • Instruction ID: afc2a24109b5524a715c6b2c3ba94efa30044fcd1fda98386a67971cc6d85b1b
                                                                                                          • Opcode Fuzzy Hash: ba61b9740d2fabcbb053f7a8c1a04480db4f8b8fe58e62101f9bba5b1f63e096
                                                                                                          • Instruction Fuzzy Hash: 1851F131B04A8845F7E6DB25A8917DA22A1A78D7C8F668112FE5A03B95DF38C30DC709

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1509 180041044-180041092 call 180040ae0 1512 180041094-180041099 call 1800408e4 1509->1512 1513 1800410bb-1800410be 1509->1513 1522 18004109c-1800410a7 call 180042888 1512->1522 1515 1800410e4-1800410f2 1513->1515 1516 1800410c0-1800410d5 call 1800408e4 call 180042888 1513->1516 1517 1800410f4-1800410fe call 1800408e4 1515->1517 1518 180041100-180041112 1515->1518 1538 1800410b4-1800410b6 1516->1538 1542 1800410d7-1800410e2 1516->1542 1517->1522 1523 180041118-18004113f call 180040f4c 1518->1523 1524 1800411ab-1800411b8 1518->1524 1522->1538 1539 1800410a9-1800410ad 1522->1539 1540 180041141-180041148 1523->1540 1541 18004115e-180041162 1523->1541 1526 1800411c0-180041201 1524->1526 1527 1800411ba-1800411bd 1524->1527 1532 180041222-180041226 1526->1532 1533 180041203-180041220 1526->1533 1527->1526 1537 18004122a-180041236 1532->1537 1533->1537 1543 180041238-18004123b 1537->1543 1544 18004123d-18004124d 1537->1544 1545 18004140a-180041423 1538->1545 1539->1538 1540->1545 1546 18004114e-180041159 1540->1546 1547 180041164-180041167 1541->1547 1548 18004116a-180041190 call 180046f14 1541->1548 1542->1538 1549 180041250-180041253 1543->1549 1544->1549 1546->1545 1547->1548 1557 1800411a2-1800411a6 1548->1557 1558 180041192-18004119e 1548->1558 1551 1800412e4-1800412e7 1549->1551 1552 180041259 1549->1552 1554 180041308-18004132b 1551->1554 1555 1800412e9-180041304 call 18003ece0 1551->1555 1556 180041263-180041266 1552->1556 1563 180041337-18004133f 1554->1563 1564 18004132d-180041335 1554->1564 1555->1554 1561 180041297-18004129b 1556->1561 1562 180041268-18004127f 1556->1562 1559 1800413fb 1557->1559 1558->1557 1566 180041408 1559->1566 1567 1800413fd-180041401 1559->1567 1561->1551 1571 18004129d-1800412b0 1561->1571 1569 180041281 1562->1569 1570 180041284-180041295 1562->1570 1565 180041342-18004134f 1563->1565 1564->1565 1573 180041351-180041382 1565->1573 1574 180041384-180041388 1565->1574 1566->1545 1567->1566 1569->1570 1570->1556 1570->1561 1571->1551 1572 1800412b2 1571->1572 1575 1800412b6-1800412b9 1572->1575 1573->1574 1576 18004138a-1800413b5 1573->1576 1574->1576 1577 1800413b8-1800413bb 1574->1577 1578 1800412c0-1800412c6 1575->1578 1579 1800412bb-1800412be 1575->1579 1576->1577 1580 1800413c3-1800413eb 1577->1580 1581 1800413bd-1800413c1 1577->1581 1578->1575 1579->1578 1582 1800412c8-1800412cb 1579->1582 1583 1800413ee-1800413f7 1580->1583 1581->1580 1581->1583 1584 1800412e1 1582->1584 1585 1800412cd-1800412d2 1582->1585 1583->1559 1584->1551 1586 1800412d4-1800412d9 1585->1586 1587 1800412db-1800412df 1585->1587 1586->1551 1587->1551
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
                                                                                                          • String ID: gfffffff
                                                                                                          • API String ID: 1282097019-1523873471
                                                                                                          • Opcode ID: 24a95ef78a624545ba7c9d7dc106d39f48c7645bdea6b767835b0edbd9f1c844
                                                                                                          • Instruction ID: cd9f51b8cdbe88b98d15d95ecd3b9eaa2330d4955cd9fdd12c4ed391452db137
                                                                                                          • Opcode Fuzzy Hash: 24a95ef78a624545ba7c9d7dc106d39f48c7645bdea6b767835b0edbd9f1c844
                                                                                                          • Instruction Fuzzy Hash: 3EB17773704BC88AEB92CB25C6803DD6BA5F3197D9F05C621EF59877D5EA388629C304
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 3778485334-0
                                                                                                          • Opcode ID: c3598976ca1632c357be4ba8301645e2a35c7deb92361203275c35b9385dcc3e
                                                                                                          • Instruction ID: 868fa4e71887f5911bd689abb344e6afb6984900060eeb71dea75f24283ff6da
                                                                                                          • Opcode Fuzzy Hash: c3598976ca1632c357be4ba8301645e2a35c7deb92361203275c35b9385dcc3e
                                                                                                          • Instruction Fuzzy Hash: 6C31F335208F8885EB929B10F8843DA73A1F78D3D8F518126FA9D42BA5DF7CC298C705
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1239891234-0
                                                                                                          • Opcode ID: 687f001dfb37a47157b6f2a046625e947f4851768aa9483d248bdf8ccabb4226
                                                                                                          • Instruction ID: ce6028df09523790c5ce4c1857c5788db5e4af3653a889637483fba63be9d821
                                                                                                          • Opcode Fuzzy Hash: 687f001dfb37a47157b6f2a046625e947f4851768aa9483d248bdf8ccabb4226
                                                                                                          • Instruction Fuzzy Hash: C8319132204F8486EBA1CF25E8807DE77A0F788798F51411AFA9D43B99DF38C649CB00
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _set_statfp
                                                                                                          • String ID: !$atan2f
                                                                                                          • API String ID: 1156100317-746904718
                                                                                                          • Opcode ID: 922dedef4b508459671a67f39f388c8a37360033d7157b9d186a1199daea5b28
                                                                                                          • Instruction ID: d5c9dca1ae84759df08d4f946077274373d06d771ca18e833c4e4ac63076a48d
                                                                                                          • Opcode Fuzzy Hash: 922dedef4b508459671a67f39f388c8a37360033d7157b9d186a1199daea5b28
                                                                                                          • Instruction Fuzzy Hash: 43C1D231624ECC88E6B78B3254103E7E3547F5F7D4F16D312B92A36AD4EF29868A8700

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 119 18004a638-18004a63b 120 18004aa25 119->120 121 18004a641-18004aa24 call 18003e220 * 86 119->121 121->120
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2737118440-0
                                                                                                          • Opcode ID: 258e030ea8eef92e677a1f4030c5f0b19a91ecd9a257867854d2aa094b2d70cf
                                                                                                          • Instruction ID: 4d872ec27d9ca8d6f8751ad299c95db9e4a79eb5509a17a55bae787e74e0c8bc
                                                                                                          • Opcode Fuzzy Hash: 258e030ea8eef92e677a1f4030c5f0b19a91ecd9a257867854d2aa094b2d70cf
                                                                                                          • Instruction Fuzzy Hash: 54A1553121158885E6C3BB71F8957DF1325ABCAF84F059E32BB4D4B5E7CE10DA498390

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • LoadLibraryW.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046ACD
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046AE9
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046AFB
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B12
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B1B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B32
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B3B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B52
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B5B
                                                                                                          • GetProcAddress.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B7A
                                                                                                          • EncodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046B83
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046BB6
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046BC6
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C1C
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C3D
                                                                                                          • DecodePointer.KERNEL32(?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180046C57
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                                                          • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                                                          • API String ID: 2643518689-564504941
                                                                                                          • Opcode ID: 1824d7e647174aac9ba8a228052728ff37a26939126cb63fc2dd71cb4fdc05b6
                                                                                                          • Instruction ID: df7a2586361332801e439d358c24d371d3d75d19ea64f50f1298fa16b69f6015
                                                                                                          • Opcode Fuzzy Hash: 1824d7e647174aac9ba8a228052728ff37a26939126cb63fc2dd71cb4fdc05b6
                                                                                                          • Instruction Fuzzy Hash: A6514A30602F5980FED7DB51BC943E523A1BB8EBC8F068424BC5E433A0EE38968D8315
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2315031519-0
                                                                                                          • Opcode ID: 27ee3e071bdb6c1f7188517e3c46bf29d4632009371291bd4a31ced4f22275c5
                                                                                                          • Instruction ID: beaf73869c5ab8301a8de9efe598f3bfa40f1db9310f99e121f6dd647ad85f45
                                                                                                          • Opcode Fuzzy Hash: 27ee3e071bdb6c1f7188517e3c46bf29d4632009371291bd4a31ced4f22275c5
                                                                                                          • Instruction Fuzzy Hash: 8322F572205E8886F7A38F64D4C03EC2B91A749BDEF56C115EA96077D3DE78C649C309

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1144 1800478b4-1800478d0 1145 1800478d2-1800478dc 1144->1145 1146 18004794b-180047955 1144->1146 1145->1146 1147 1800478de-1800478e8 1145->1147 1148 180047957-18004795a 1146->1148 1149 18004799e-1800479af 1146->1149 1147->1146 1152 1800478ea-1800478ed 1147->1152 1148->1149 1153 18004795c-180047999 call 18003e220 * 4 1148->1153 1150 1800479b1-1800479b8 1149->1150 1151 1800479cb-1800479cf 1149->1151 1150->1151 1154 1800479ba-1800479c6 call 18004a638 call 18003e220 1150->1154 1156 1800479d4-1800479df 1151->1156 1152->1146 1155 1800478ef-1800478f9 1152->1155 1153->1149 1154->1151 1159 180047911-18004791b 1155->1159 1160 1800478fb-1800478fe 1155->1160 1161 1800479e1-1800479e7 1156->1161 1162 1800479f3-1800479f8 1156->1162 1168 180047933-180047946 call 18003e220 * 2 1159->1168 1169 18004791d-180047920 1159->1169 1160->1159 1165 180047900-18004790c call 18003e220 call 18004aa94 1160->1165 1161->1162 1166 1800479e9-1800479ec 1161->1166 1170 180047a0d-180047a14 1162->1170 1171 1800479fa-180047a01 1162->1171 1165->1159 1166->1162 1176 1800479ee call 18003e220 1166->1176 1168->1146 1169->1168 1178 180047922-18004792e call 18003e220 call 18004aa28 1169->1178 1170->1156 1172 180047a16-180047a27 1170->1172 1171->1170 1179 180047a03-180047a06 1171->1179 1176->1162 1178->1168 1179->1170 1185 180047a08 call 18003e220 1179->1185 1185->1170
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$FreeHeap__free_lconv_mon__free_lconv_num_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 2573795696-0
                                                                                                          • Opcode ID: 5a0bd3a4139776b5973723257e7de0a69dd99bb23b7eab651e3109ceedcb2a20
                                                                                                          • Instruction ID: 64e24b2416a1ca949d6f303a85acd9c423b1c112d23fea3cbc33af8ea2b513f7
                                                                                                          • Opcode Fuzzy Hash: 5a0bd3a4139776b5973723257e7de0a69dd99bb23b7eab651e3109ceedcb2a20
                                                                                                          • Instruction Fuzzy Hash: 6041113230298884FFD79F61D4903EE2354E78DBD8F059931BA4D4A2D6CF28CA99C355

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1193 18004cb30-18004cb66 call 180048148 1196 18004cbb8-18004cbbd call 1800408e4 1193->1196 1197 18004cb68-18004cb79 call 180048148 1193->1197 1202 18004cbbf-18004cbdd 1196->1202 1197->1196 1203 18004cb7b-18004cb84 1197->1203 1204 18004cb8a-18004cbab GetProcessHeap HeapAlloc 1203->1204 1205 18004cc4b 1203->1205 1206 18004cbad-18004cbb2 call 1800408e4 1204->1206 1207 18004cbde-18004cbea call 18004ccc8 1204->1207 1208 18004cc4d-18004cc5e call 180048148 1205->1208 1209 18004ccaa-18004ccbb call 180048148 1205->1209 1206->1196 1219 18004cbed-18004cc04 call 180044774 1207->1219 1208->1196 1220 18004cc64-18004cc83 call 180048db0 SetEndOfFile 1208->1220 1209->1196 1218 18004ccc1-18004ccc3 1209->1218 1218->1202 1226 18004cc06-18004cc0e 1219->1226 1227 18004cc12-18004cc1a call 180040904 1219->1227 1220->1209 1225 18004cc85-18004cc9e call 1800408e4 call 180040904 GetLastError 1220->1225 1241 18004cca0-18004cca4 1225->1241 1230 18004cc10 1226->1230 1231 18004cc2b-18004cc49 call 18004ccc8 GetProcessHeap HeapFree 1226->1231 1235 18004cc27 1227->1235 1236 18004cc1c-18004cc21 call 1800408e4 1227->1236 1230->1219 1231->1241 1235->1231 1236->1235 1241->1196 1241->1209
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$Heap$ErrorFileLastProcess__doserrno$AllocFreePointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 3112900366-0
                                                                                                          • Opcode ID: 5c1484790b7029330c56b00ce7b4326b62192608e4fc1df10d09937e4c225644
                                                                                                          • Instruction ID: fe7456c0442f1bcdb1b8f511e1c750bbd640e26c1f04292c679d1de3200e95df
                                                                                                          • Opcode Fuzzy Hash: 5c1484790b7029330c56b00ce7b4326b62192608e4fc1df10d09937e4c225644
                                                                                                          • Instruction Fuzzy Hash: 6741E131300E5841EAD6AB3598857DC2291A74DBF8F56C711F939077D2DF38CA49878A

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1304 18004a0f4-18004a131 1305 18004a133-18004a136 1304->1305 1306 18004a15d-18004a166 1304->1306 1309 18004a139-18004a13f 1305->1309 1307 18004a168-18004a16b 1306->1307 1308 18004a16f-18004a199 MultiByteToWideChar 1306->1308 1307->1308 1310 18004a1a2-18004a1ae 1308->1310 1311 18004a19b-18004a19d 1308->1311 1312 18004a141-18004a147 1309->1312 1313 18004a14d-18004a159 1309->1313 1315 18004a20e-18004a211 1310->1315 1316 18004a1b0-18004a1bd 1310->1316 1314 18004a398-18004a39c 1311->1314 1312->1309 1317 18004a149 1312->1317 1313->1306 1318 18004a15b 1313->1318 1320 18004a39f call 18003e5c0 1314->1320 1315->1311 1319 18004a213-18004a233 MultiByteToWideChar 1315->1319 1316->1315 1321 18004a1bf-18004a1cb 1316->1321 1317->1313 1318->1306 1322 18004a385-18004a38f 1319->1322 1323 18004a239-18004a25d LCMapStringW 1319->1323 1324 18004a3a4-18004a3bd 1320->1324 1325 18004a1f7 1321->1325 1326 18004a1cd-18004a1d4 1321->1326 1327 18004a396 1322->1327 1328 18004a391 call 18003e220 1322->1328 1323->1322 1329 18004a263-18004a26c 1323->1329 1332 18004a1f7 call 18003e168 1325->1332 1330 18004a1d6 1326->1330 1331 18004a1d9-18004a1ed call 18003f160 1326->1331 1327->1314 1328->1327 1334 18004a2a5-18004a2a7 1329->1334 1335 18004a26e-18004a273 1329->1335 1330->1331 1331->1311 1347 18004a1ef-18004a1f5 1331->1347 1337 18004a1fc-18004a202 1332->1337 1340 18004a310 1334->1340 1341 18004a2a9-18004a2b6 1334->1341 1335->1322 1339 18004a279-18004a27b 1335->1339 1337->1315 1338 18004a204 1337->1338 1343 18004a20a 1338->1343 1339->1322 1344 18004a281-18004a2a0 LCMapStringW 1339->1344 1345 18004a312-18004a315 1340->1345 1341->1340 1346 18004a2b8-18004a2c0 1341->1346 1343->1315 1344->1322 1345->1322 1348 18004a317-18004a336 LCMapStringW 1345->1348 1349 18004a2f7 1346->1349 1350 18004a2c2-18004a2c9 1346->1350 1347->1343 1352 18004a338-18004a34f 1348->1352 1353 18004a374-18004a37e 1348->1353 1351 18004a2f7 call 18003e168 1349->1351 1354 18004a2d5-18004a2e9 call 18003f160 1350->1354 1355 18004a2cb 1350->1355 1356 18004a2fc-18004a302 1351->1356 1357 18004a351-18004a35a 1352->1357 1358 18004a35c-18004a364 1352->1358 1353->1322 1359 18004a380 call 18003e220 1353->1359 1354->1322 1365 18004a2ef-18004a2f5 1354->1365 1355->1354 1356->1345 1363 18004a304 1356->1363 1364 18004a369-18004a372 WideCharToMultiByte 1357->1364 1358->1364 1359->1322 1366 18004a30a-18004a30e 1363->1366 1364->1353 1365->1366 1366->1345
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                                                                          • String ID:
                                                                                                          • API String ID: 1080698880-0
                                                                                                          • Opcode ID: 8f87ab9d2ae227485477a57223987bd8726c4cafbcef0a4fabf5341cba31a906
                                                                                                          • Instruction ID: 746fdc849fb7efc80f96b9087f0f4f5be30642e255885f1a6576107973598593
                                                                                                          • Opcode Fuzzy Hash: 8f87ab9d2ae227485477a57223987bd8726c4cafbcef0a4fabf5341cba31a906
                                                                                                          • Instruction Fuzzy Hash: 0381B732208B8886FBA69F2594803DA77D5F74E7E8F158615FA1943BD4EF78C7488308

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1367 180048408-180048429 1368 18004843e-180048441 1367->1368 1369 18004842b-18004842e 1367->1369 1370 180048446-18004844d 1368->1370 1371 180048443 1368->1371 1369->1368 1372 180048430-180048433 1369->1372 1373 180048464-18004847a call 180040ae0 1370->1373 1374 18004844f-18004845b call 1800408e4 call 180042888 1370->1374 1371->1370 1375 180048435 1372->1375 1376 180048437-180048439 1372->1376 1383 180048532-180048566 WideCharToMultiByte 1373->1383 1384 180048480-18004848c 1373->1384 1387 180048460-180048462 1374->1387 1375->1376 1377 1800484c8-1800484d7 1376->1377 1385 180048568-18004856c 1383->1385 1386 18004857b-180048584 GetLastError 1383->1386 1388 1800484d8-1800484db 1384->1388 1389 18004848e-180048491 1384->1389 1390 1800484a5-1800484bb call 1800408e4 * 2 1385->1390 1391 180048572-180048575 1385->1391 1386->1390 1394 18004858a-18004858d 1386->1394 1387->1377 1392 18004850d-180048510 1388->1392 1393 1800484dd-1800484e0 1388->1393 1389->1390 1395 180048493-180048496 1389->1395 1390->1377 1419 1800484bd-1800484c1 1390->1419 1397 180048518-18004851c 1391->1397 1399 180048577-180048579 1391->1399 1392->1397 1398 180048512 1392->1398 1400 1800484e2-1800484f5 call 1800408e4 call 180042888 1393->1400 1401 18004850b 1393->1401 1402 1800485a1-1800485b6 call 1800408e4 call 180042888 1394->1402 1403 18004858f-180048592 1394->1403 1395->1390 1404 180048498-1800484a0 call 18003ece0 1395->1404 1397->1376 1407 180048522-18004852d 1397->1407 1398->1397 1399->1397 1400->1387 1422 1800484fb-180048506 1400->1422 1401->1392 1402->1387 1421 1800485bc-1800485c7 1402->1421 1403->1402 1409 180048594-18004859c call 18003ece0 1403->1409 1404->1390 1407->1376 1409->1402 1419->1377 1421->1387 1422->1387
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 2295021086-0
                                                                                                          • Opcode ID: d8226484d9b045e3bf121a32930208bfe2de1e8e9735e94a0eea8d55c1e7fd26
                                                                                                          • Instruction ID: 9c22cb322589bbaecf03df9c4e1f5db85217bda39a9a5de2319d300efcf44f58
                                                                                                          • Opcode Fuzzy Hash: d8226484d9b045e3bf121a32930208bfe2de1e8e9735e94a0eea8d55c1e7fd26
                                                                                                          • Instruction Fuzzy Hash: 2251EA32601E4949FBE79F60C4C03EC26A0BF897ECF56C524FA4916AC5DF3886499748

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1423 1800442b4-1800442e3 GetStartupInfoW 1424 1800442e5 call 180042a74 1423->1424 1425 1800442ea-1800442f3 1424->1425 1426 1800442f5-1800442f8 1425->1426 1427 1800442fd-180044315 1425->1427 1428 180044568-180044585 1426->1428 1429 180044317 1427->1429 1430 18004435c-180044362 1427->1430 1431 18004431b-180044354 1429->1431 1432 180044368-180044370 1430->1432 1433 18004449c-18004449f 1430->1433 1431->1431 1435 180044356 1431->1435 1432->1433 1436 180044376-18004438c 1432->1436 1434 1800444a2-1800444ae 1433->1434 1437 1800444c1-1800444ea GetStdHandle 1434->1437 1438 1800444b0-1800444b5 1434->1438 1435->1430 1439 180044392 1436->1439 1440 180044419-18004441e 1436->1440 1443 180044539-18004453e 1437->1443 1444 1800444ec-1800444ef 1437->1444 1438->1437 1442 1800444b7-1800444bc 1438->1442 1441 180044399-18004439e 1439->1441 1440->1433 1445 180044420-180044425 1440->1445 1446 1800443a1 call 180042a74 1441->1446 1447 180044546-180044554 1442->1447 1443->1447 1444->1443 1448 1800444f1-1800444fc GetFileType 1444->1448 1449 180044427-18004442c 1445->1449 1450 18004448f-18004449a 1445->1450 1451 1800443a6-1800443a9 1446->1451 1447->1434 1452 18004455a-180044566 SetHandleCount 1447->1452 1448->1443 1453 1800444fe-180044508 1448->1453 1449->1450 1454 18004442e-180044433 1449->1454 1450->1433 1450->1445 1455 180044413 1451->1455 1456 1800443ab-1800443c6 1451->1456 1452->1428 1457 180044511-180044514 1453->1457 1458 18004450a-18004450f 1453->1458 1454->1450 1459 180044435-18004443a 1454->1459 1455->1440 1460 1800443c8 1456->1460 1461 180044409-18004440f 1456->1461 1462 18004451b-18004452d InitializeCriticalSectionAndSpinCount 1457->1462 1463 180044516 1457->1463 1458->1462 1464 18004444a-180044486 InitializeCriticalSectionAndSpinCount 1459->1464 1465 18004443c-180044448 GetFileType 1459->1465 1467 1800443cc-180044401 1460->1467 1461->1441 1468 180044411 1461->1468 1462->1426 1469 180044533-180044537 1462->1469 1463->1462 1464->1426 1466 18004448c 1464->1466 1465->1450 1465->1464 1466->1450 1467->1467 1470 180044403 1467->1470 1468->1440 1469->1447 1470->1461
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3473179607-2766056989
                                                                                                          • Opcode ID: 731d2ca942fb7059f98ccea79a0825b347f719a010229efa7715c3398953b345
                                                                                                          • Instruction ID: 7b13a2a208b59659a7ff2164eb285c9a59e6247728ec510e04abe0ab60cf6499
                                                                                                          • Opcode Fuzzy Hash: 731d2ca942fb7059f98ccea79a0825b347f719a010229efa7715c3398953b345
                                                                                                          • Instruction Fuzzy Hash: CE81B472200F8986EB968F14D88439937A1F748BB8F59C324EA7A477D1DF78C659C309

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1471 18004582c-180045853 1472 180045855-180045869 call 180040904 call 1800408e4 1471->1472 1473 18004586e-180045872 1471->1473 1490 18004592c 1472->1490 1475 180045915-180045921 call 180040904 call 1800408e4 1473->1475 1476 180045878-18004587e 1473->1476 1493 180045927 call 180042888 1475->1493 1476->1475 1479 180045884-1800458aa 1476->1479 1479->1475 1482 1800458ac-1800458ba 1479->1482 1483 1800458d0-1800458e2 call 180048e24 1482->1483 1484 1800458bc-1800458ce call 180040904 call 1800408e4 1482->1484 1496 1800458f5-180045907 call 1800408e4 call 180040904 1483->1496 1497 1800458e4-1800458ea 1483->1497 1484->1493 1494 18004592f-180045946 1490->1494 1493->1490 1504 18004590a-180045913 call 180048ecc 1496->1504 1500 1800458ec call 180045108 1497->1500 1502 1800458f1-1800458f3 1500->1502 1502->1504 1504->1494
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2315031519-0
                                                                                                          • Opcode ID: c62bc627254f1f1a9acb5995aa69af8956a7e938587757901c016c5564e10ee5
                                                                                                          • Instruction ID: 7682daf60427842ebd199fa13711cc73cf9a5fbc78c26fb93eb3438255fbe3e8
                                                                                                          • Opcode Fuzzy Hash: c62bc627254f1f1a9acb5995aa69af8956a7e938587757901c016c5564e10ee5
                                                                                                          • Instruction Fuzzy Hash: 7D310472310E8C86F7936F6598C13ED2650A7487E8F57C119FAA4177D3CE788A48C708
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo_wsopen_s
                                                                                                          • String ID: UNICODE$UTF-16LE$UTF-8$ccs
                                                                                                          • API String ID: 2053332431-3573488595
                                                                                                          • Opcode ID: b0c4c6ed9e8498d35fe9303ea9063a51c90cfbb9c06f99b476d42cc90f5ed235
                                                                                                          • Instruction ID: 3e9b913e688f760b830cb86a69413b8bce1326bacd42ec6ba54fe81f9aa2ab57
                                                                                                          • Opcode Fuzzy Hash: b0c4c6ed9e8498d35fe9303ea9063a51c90cfbb9c06f99b476d42cc90f5ed235
                                                                                                          • Instruction Fuzzy Hash: DD711472E04A0C55FBF75A12A9867EA16E0675D7CCE17E024FE0A029C5DF38CB4C8389
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2959964966-0
                                                                                                          • Opcode ID: ca76609593e7968924802dd47909a67a3de79fc0893ea02630d952cda44f7c31
                                                                                                          • Instruction ID: b8706fcba3373454a4b01edf78d16520a1e85cc0d5fe777b1d3ba09b79c1032e
                                                                                                          • Opcode Fuzzy Hash: ca76609593e7968924802dd47909a67a3de79fc0893ea02630d952cda44f7c31
                                                                                                          • Instruction Fuzzy Hash: 0C41D936604E4852EBE64B2581C13EC37A0F7097DDF258605FBA5836C2CF74CAA9C784
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno_lseek_nolock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3948042459-0
                                                                                                          • Opcode ID: 5491721df6ad7ab657e95dd21b0d4c728b4e8247b75b654f02dc873897995978
                                                                                                          • Instruction ID: bdeca9385717e63bca4346382234fa7d175972a54972681b325d5814d0ceb23a
                                                                                                          • Opcode Fuzzy Hash: 5491721df6ad7ab657e95dd21b0d4c728b4e8247b75b654f02dc873897995978
                                                                                                          • Instruction Fuzzy Hash: 43213133200E8842F787AF2599C03EC2511A7887E9F1BC104FA140B2D3CF788A4AC718
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 113790786-0
                                                                                                          • Opcode ID: f6cddf33ec298a8bb8cbf7baaf3bba66f453517a4b756cab4bc748b5810b4bcf
                                                                                                          • Instruction ID: edbf6d34453fbc39e254c7b3028adf59088a67094ee2582bf57cf3f75258cf43
                                                                                                          • Opcode Fuzzy Hash: f6cddf33ec298a8bb8cbf7baaf3bba66f453517a4b756cab4bc748b5810b4bcf
                                                                                                          • Instruction Fuzzy Hash: 9421A471A01E8C81F6E7AB10E5843EE2264E74C7C8F16D425B646576E6DF38CA4CC74A
                                                                                                          APIs
                                                                                                          • _lock.LIBCMT ref: 00000001800403A9
                                                                                                            • Part of subcall function 000000018004660C: _amsg_exit.LIBCMT ref: 0000000180046636
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 00000001800403DC
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 00000001800403FA
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 000000018004043A
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 0000000180040454
                                                                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,0000000180040551,?,?,00000000,000000018004663B), ref: 0000000180040464
                                                                                                          • ExitProcess.KERNEL32 ref: 00000001800404F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DecodePointer$ExitProcess_amsg_exit_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3411037476-0
                                                                                                          • Opcode ID: 90629936087b4b343afb6f5e2ea20390e49e002a64f4209c8e454aa55673ad60
                                                                                                          • Instruction ID: 28dce3b8938bf884f7e9275428b3a2511fbaf5e224c98a8887a53a350d5d9406
                                                                                                          • Opcode Fuzzy Hash: 90629936087b4b343afb6f5e2ea20390e49e002a64f4209c8e454aa55673ad60
                                                                                                          • Instruction Fuzzy Hash: 5041BD71212F8885E6C28F11EC8439962A5F78CBCCF25C424FA5E537A5EF78C68D8709
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 9c7078870c8113ac2fa39057a7caf9cf7a186e07d7669db40971e880b171e245
                                                                                                          • Instruction ID: 88e291cd6d8539d56209442e2423bdf494ec1d3842b4b11067e362a5da303880
                                                                                                          • Opcode Fuzzy Hash: 9c7078870c8113ac2fa39057a7caf9cf7a186e07d7669db40971e880b171e245
                                                                                                          • Instruction Fuzzy Hash: 4321D032310D4C41FA976F15DA813ED2611AB48BF8F1B8B05FE340B2D3CEB88A45A358
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: e06bde92bf7a4f08831d8cf039223712935559a8b634ef27faa4aece7a856289
                                                                                                          • Instruction ID: 3623e0460e9e27de6361ba960c2d9fdc26985ee9637d6ca9ed7da609fcd3abb5
                                                                                                          • Opcode Fuzzy Hash: e06bde92bf7a4f08831d8cf039223712935559a8b634ef27faa4aece7a856289
                                                                                                          • Instruction Fuzzy Hash: 64212333210E4C46F697AF25D9C13ED2611AB88BE9F1BC114FA140B2D3CF788A49C758
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$BuffersErrorFileFlushLast__doserrno
                                                                                                          • String ID:
                                                                                                          • API String ID: 1845094721-0
                                                                                                          • Opcode ID: efec3c3d13410bf04e0dd30c0ef053db8f256237de7b4ac0eddf3cca2fd18b4a
                                                                                                          • Instruction ID: aae8da55411f6dd9c1530ed359ea5e4f4d8b6876908d31b57a3ddde22457d520
                                                                                                          • Opcode Fuzzy Hash: efec3c3d13410bf04e0dd30c0ef053db8f256237de7b4ac0eddf3cca2fd18b4a
                                                                                                          • Instruction Fuzzy Hash: 3D21F931701E8D41F6936FA598C83ED2651A7887D8F1BC528B615173E2CE788A8CD358
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: free$_amsg_exit_errno_getptd$FreeHeapSleep_lockmalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 2578750445-0
                                                                                                          • Opcode ID: 94a589883ec5155802fd95d7fab442aedf742fc852adba6379efa46134cd3324
                                                                                                          • Instruction ID: da64bb642503be74eb0f6c14831e4ed13401b41da4aced71e1065a25a4b3c3bf
                                                                                                          • Opcode Fuzzy Hash: 94a589883ec5155802fd95d7fab442aedf742fc852adba6379efa46134cd3324
                                                                                                          • Instruction Fuzzy Hash: 9351B132300E8846E7E69B24A4803EA77A1F348BC8F56C116FA4E473E7CE38C649C744
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
                                                                                                          • String ID:
                                                                                                          • API String ID: 517548149-0
                                                                                                          • Opcode ID: 162e3acb479bf9528d8707f072606d60b166762714a5c8eb78a8a61cfab57453
                                                                                                          • Instruction ID: 28af58077e327febc6153a716ebded174d2046a11fd0603b2a2b94e2c4208846
                                                                                                          • Opcode Fuzzy Hash: 162e3acb479bf9528d8707f072606d60b166762714a5c8eb78a8a61cfab57453
                                                                                                          • Instruction Fuzzy Hash: 31219532A04B8485EBA68F11B48039A77E4F78DFC8F498114FE8A07764EF38D695C709
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 3cad00805c535d9d6a24c2447e46d4ac982fe79615d762552acafacf46815b53
                                                                                                          • Instruction ID: 94c96575089f4780a32a9ec00bd264dd4655c24e9f54b770cefb0f1c2659e3b0
                                                                                                          • Opcode Fuzzy Hash: 3cad00805c535d9d6a24c2447e46d4ac982fe79615d762552acafacf46815b53
                                                                                                          • Instruction Fuzzy Hash: 6B110632A00E8C42F6976F2699C23DC2651A7487E9F27E518B516073D3CEB88E48C758
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432B2
                                                                                                          • FlsGetValue.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432C0
                                                                                                          • SetLastError.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 0000000180043318
                                                                                                            • Part of subcall function 0000000180042A74: Sleep.KERNEL32(?,?,?,00000001800432DB,?,?,?,00000001800408ED,?,?,?,?,000000018003E245), ref: 0000000180042AB9
                                                                                                          • FlsSetValue.KERNEL32(?,?,?,00000001800408ED,?,?,?,?,000000018003E245,?,?,?,000000018000110D), ref: 00000001800432EC
                                                                                                          • free.LIBCMT ref: 000000018004330F
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 0000000180043300
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 3106088686-0
                                                                                                          • Opcode ID: 6c9f45206866909c37ad9c1b1df65dd8d4f15302a450987df3cd1bb5765d3834
                                                                                                          • Instruction ID: e35cefd1ee5cff6cda42b7689ae65c05deeff37c9490ea75c646b2ce74ee25c0
                                                                                                          • Opcode Fuzzy Hash: 6c9f45206866909c37ad9c1b1df65dd8d4f15302a450987df3cd1bb5765d3834
                                                                                                          • Instruction Fuzzy Hash: 4B018830200F8886FFD79F6594C53A86261AB4D7D8F05C624FD25033D1EE38C68C8314
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_fileno_invalid_parameter_noinfomemcpy_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 897514287-0
                                                                                                          • Opcode ID: 9c77f83cd8700deaabc0fd9fd6977863926e76bbc046ac42a92e242d67ca67a7
                                                                                                          • Instruction ID: 0586abbaa753a26bf92c3da2f0c0844abfb432f7583a0abf359983cbd5339943
                                                                                                          • Opcode Fuzzy Hash: 9c77f83cd8700deaabc0fd9fd6977863926e76bbc046ac42a92e242d67ca67a7
                                                                                                          • Instruction Fuzzy Hash: 4B513431304A4895EAB79E2695007BB6B80B74DBE4F19C7217E6D57BD0CF36C69A8340
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$_lock$CountEnterInitializeLeaveSpin
                                                                                                          • String ID:
                                                                                                          • API String ID: 3451527041-0
                                                                                                          • Opcode ID: ad7bfc99954593bcf8eda28a1d2ef663cbe48e0c93a53522361127f56cae083a
                                                                                                          • Instruction ID: 8c218b1dd958de25de949e51088d6abf58d8baf781aaa410045e41d8f4ca076a
                                                                                                          • Opcode Fuzzy Hash: ad7bfc99954593bcf8eda28a1d2ef663cbe48e0c93a53522361127f56cae083a
                                                                                                          • Instruction Fuzzy Hash: 9351E672601F4886EBA28B50D4803ADA691F7987ECF068625FE6A033D5DF78C65DC705
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
                                                                                                          • String ID:
                                                                                                          • API String ID: 2574049805-0
                                                                                                          • Opcode ID: 4ff880635ef4d904e09ebc87325dda54b86b1ac69e38fcb8f2c0d3ea48b9a742
                                                                                                          • Instruction ID: eb1a6f5e6da6c3769f147ceaaaa7fc0fc70cae78f6684998a98c0054d036f7c8
                                                                                                          • Opcode Fuzzy Hash: 4ff880635ef4d904e09ebc87325dda54b86b1ac69e38fcb8f2c0d3ea48b9a742
                                                                                                          • Instruction Fuzzy Hash: CD41F472600F4C4AEBD69F29C4913EC36A0F748BD8F168215FA69473D5DE34CA55C788
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 307345228-0
                                                                                                          • Opcode ID: 93dcc5b94d4ecd0e86884504227929fb1291d854fb79cbca14ab971fb09c5493
                                                                                                          • Instruction ID: c1e8cdc11ca7ad10a2207395aac586f5b43039c7c9522db95887dc8847b2f22a
                                                                                                          • Opcode Fuzzy Hash: 93dcc5b94d4ecd0e86884504227929fb1291d854fb79cbca14ab971fb09c5493
                                                                                                          • Instruction Fuzzy Hash: 1F419432204F8486FB929F25A8407DA6395F78DBECF5A8611BE2D477D4DF38C5098708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_excf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3843346586-0
                                                                                                          • Opcode ID: 4fed85a8e9323bfe2c854ad3ef067d745824d256f9f05b55b1c983bcfd5a2ff9
                                                                                                          • Instruction ID: 35ab72a1ed03ce81a25cb5b39f41f12cf8ca01baf8c7fa63cc16a06614d8d2ce
                                                                                                          • Opcode Fuzzy Hash: 4fed85a8e9323bfe2c854ad3ef067d745824d256f9f05b55b1c983bcfd5a2ff9
                                                                                                          • Instruction Fuzzy Hash: 5041E432614E888AE752DB26E4813EEB771FBCD3C8F415325FA4956A58DF38D589CB00
                                                                                                          APIs
                                                                                                          • DecodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E64D
                                                                                                          • DecodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E65D
                                                                                                            • Part of subcall function 0000000180042B80: _errno.LIBCMT ref: 0000000180042B89
                                                                                                            • Part of subcall function 0000000180042B80: _invalid_parameter_noinfo.LIBCMT ref: 0000000180042B94
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6DB
                                                                                                            • Part of subcall function 0000000180042AF8: realloc.LIBCMT ref: 0000000180042B23
                                                                                                            • Part of subcall function 0000000180042AF8: Sleep.KERNEL32(?,?,00000000,000000018003E6CB,?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 0000000180042B3F
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6EB
                                                                                                          • EncodePointer.KERNEL32(?,?,?,000000018003E739,?,?,?,?,00000001800129B9), ref: 000000018003E6F8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
                                                                                                          • String ID:
                                                                                                          • API String ID: 1909145217-0
                                                                                                          • Opcode ID: ed15b638c86beb6079fb653881b7bedfcb1da94e35fa47f475b2029b95edd674
                                                                                                          • Instruction ID: fe7b83a0f1e081e7fa5e6d38d200593cd4bdb274e8300509f1d988dc7ce839eb
                                                                                                          • Opcode Fuzzy Hash: ed15b638c86beb6079fb653881b7bedfcb1da94e35fa47f475b2029b95edd674
                                                                                                          • Instruction Fuzzy Hash: B521A130302B8881EA939B52E9893CAA352B34EBD4F45C825F91E17394DE78C68D8344
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                          • String ID:
                                                                                                          • API String ID: 1445889803-0
                                                                                                          • Opcode ID: 92565ea8d5c85b212df12a7ebaa521c2a5878a6861afd3c9b07c384d7c5c1395
                                                                                                          • Instruction ID: 4acdcd43e76b003da33731daa7b3035c29bec53c6226794cfad176108422307a
                                                                                                          • Opcode Fuzzy Hash: 92565ea8d5c85b212df12a7ebaa521c2a5878a6861afd3c9b07c384d7c5c1395
                                                                                                          • Instruction Fuzzy Hash: 3101A131214E4886E792CF21E8847857360F74DBD8F05A520FE6A177A0DF38CAC88305
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __doserrno_errno
                                                                                                          • String ID:
                                                                                                          • API String ID: 921712934-0
                                                                                                          • Opcode ID: 04538ce0f69410465c08cf912922deca18a28768c91d40277fbb7ad585d34a5d
                                                                                                          • Instruction ID: 3fb9fc9a06773a5ddc4cf9db8930bc32603d4213745492d31301100f49cfba50
                                                                                                          • Opcode Fuzzy Hash: 04538ce0f69410465c08cf912922deca18a28768c91d40277fbb7ad585d34a5d
                                                                                                          • Instruction Fuzzy Hash: 730181B2A01E4C41FE976B55C8C13EC22519B98BE9FA7CB05F629063D2CFB846089355
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: powf
                                                                                                          • String ID: ..\..\Cooking\src\ConvexMeshBuilder.cpp$Failed to rebuild Opcode model.$Failed to refit Opcode model.
                                                                                                          • API String ID: 3445610689-3682976713
                                                                                                          • Opcode ID: 216dec962e8dca91ec4070bef38bf642e1f4696c0a72cbfcd53967bfc60aac4b
                                                                                                          • Instruction ID: c1c056e1c85f343c2078a2337025b71bb37fd292796a6b4142674db4036b91a6
                                                                                                          • Opcode Fuzzy Hash: 216dec962e8dca91ec4070bef38bf642e1f4696c0a72cbfcd53967bfc60aac4b
                                                                                                          • Instruction Fuzzy Hash: A5E14233A347C89AD342CB3694853E9B360FF6E789F299716EB04321B5DB2161D5AF10
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                                                          • String ID: -
                                                                                                          • API String ID: 485257318-2547889144
                                                                                                          • Opcode ID: 7fdfd41007377c7044378e94245d290bf8d3290ad409f6aff9913dfa4249c632
                                                                                                          • Instruction ID: d709b449ce76c0cccf1e9d4ca559e2f814d34352179fa1e3acc4947a0398de61
                                                                                                          • Opcode Fuzzy Hash: 7fdfd41007377c7044378e94245d290bf8d3290ad409f6aff9913dfa4249c632
                                                                                                          • Instruction Fuzzy Hash: 5831F832308E8849EBA29A21E4807DDB7A0BB49BD9F55C211FF9807BC5DF38C649C704
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                                          • String ID: 1
                                                                                                          • API String ID: 2819658684-2212294583
                                                                                                          • Opcode ID: acab422b16e29b316407dfade680dd80396a7f151f61521eb08063fae4db2bda
                                                                                                          • Instruction ID: 3afd2d037a64dffeabbd375ce9f5099401c357d53f3d192c0fa9e8baf7547702
                                                                                                          • Opcode Fuzzy Hash: acab422b16e29b316407dfade680dd80396a7f151f61521eb08063fae4db2bda
                                                                                                          • Instruction Fuzzy Hash: 8C21C232719AC895F7979B2484903EC6A9097197C8F9BC071B64D06383DE2ACB4DC719
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
                                                                                                          • String ID: bad allocation
                                                                                                          • API String ID: 2837191506-2104205924
                                                                                                          • Opcode ID: 69166dead89ba0001818fcb42f863f8f744a8727467665a40b2d329f3b4ae9c4
                                                                                                          • Instruction ID: 2638e90aacf5b7bd257e9f3c7290f5987344553ab20e9d5bcdf450cefdde47fc
                                                                                                          • Opcode Fuzzy Hash: 69166dead89ba0001818fcb42f863f8f744a8727467665a40b2d329f3b4ae9c4
                                                                                                          • Instruction Fuzzy Hash: FF012971210F4D95FAA2EF10FC913E923A1AB4C3C8F999515B98A466A6EF78C34CC744
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(?,?,000000FF,00000001800401F9,?,?,00000028,000000018003E1B1,?,?,00000000,0000000180042A24,?,?,?,0000000180046585), ref: 00000001800401BF
                                                                                                          • GetProcAddress.KERNEL32(?,?,000000FF,00000001800401F9,?,?,00000028,000000018003E1B1,?,?,00000000,0000000180042A24,?,?,?,0000000180046585), ref: 00000001800401D4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 1646373207-1276376045
                                                                                                          • Opcode ID: ba0dafc19b2472185031fd18bc234a06f9b3256a42d53cff56055289a2376332
                                                                                                          • Instruction ID: a0660a350e574b67e0b4226d0f2eee7d3bf1d40f10e0bb7c7f0877cdf3d5dc59
                                                                                                          • Opcode Fuzzy Hash: ba0dafc19b2472185031fd18bc234a06f9b3256a42d53cff56055289a2376332
                                                                                                          • Instruction Fuzzy Hash: 47E01230701B0841FF9B5B90ACE87E812905B4DB85F49D428A81E163A0DE78C7CDC354
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinf$wprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 2107656780-0
                                                                                                          • Opcode ID: 382b214eebf19062cad19f456cb08a0201fd66ced005d341dfe06ad299dadf82
                                                                                                          • Instruction ID: 46b4470296fbe892be20eddff3f83e40b80dd16ede03d11ccee520d7224549a9
                                                                                                          • Opcode Fuzzy Hash: 382b214eebf19062cad19f456cb08a0201fd66ced005d341dfe06ad299dadf82
                                                                                                          • Instruction Fuzzy Hash: D5819632A24B8C85E253973754823EAB350BF6E3D5F2ED712FE4436672DB3592859700
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3160392742-0
                                                                                                          • Opcode ID: 710fe8378ab7627c6d3ad517a7fb43d291aca31b161ca0839560dead9768729b
                                                                                                          • Instruction ID: 1cead7b32d2bbf2f5b55d1c3a91411fd1ac8757cce8477ee880dc762cf88697a
                                                                                                          • Opcode Fuzzy Hash: 710fe8378ab7627c6d3ad517a7fb43d291aca31b161ca0839560dead9768729b
                                                                                                          • Instruction Fuzzy Hash: B961A332A20BCC89F3539B3598413E9B390FF6D399F59D316F958637A1EB3496968300
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 27599310-0
                                                                                                          • Opcode ID: 3ba312c050f11dc89975966b9274c87d68241d0575a534c57e7272571b709c94
                                                                                                          • Instruction ID: 3bc55bf60f611b24502ee0385f2e896cb3150c86a8d65ec0ab32753a95d692e4
                                                                                                          • Opcode Fuzzy Hash: 3ba312c050f11dc89975966b9274c87d68241d0575a534c57e7272571b709c94
                                                                                                          • Instruction Fuzzy Hash: BA519931A04F4882F6EB8B1494C43E96791F78D7CCF66C519F95A026A4EF39DA4DC30A
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fileno_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 3179357039-0
                                                                                                          • Opcode ID: d41cd86fc7fb8144f4059a54d214e4fa40f97208075d2dc81462a2ea984e8e8f
                                                                                                          • Instruction ID: d0906d9fb1a41af227b7a35f2f9a52febfb977d410d2cbb6bbfff6933d0bdc86
                                                                                                          • Opcode Fuzzy Hash: d41cd86fc7fb8144f4059a54d214e4fa40f97208075d2dc81462a2ea984e8e8f
                                                                                                          • Instruction Fuzzy Hash: 6B51AE32200B8D86EBB79E25C4453AB3791E788BD8F5AC115EE45073D5CE76CA49C340
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_fileno_flush_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 329365992-0
                                                                                                          • Opcode ID: 698076d28cb656be0e290576a6c6d4183abae3acb9cc80cd1dacd601588005bc
                                                                                                          • Instruction ID: 994570d0ed5c695223296e2820c58eafbc39b0a3d3290f0a7fd1d0bd978d184a
                                                                                                          • Opcode Fuzzy Hash: 698076d28cb656be0e290576a6c6d4183abae3acb9cc80cd1dacd601588005bc
                                                                                                          • Instruction Fuzzy Hash: 3041383130864846EEFB8E26A5443FFA781B74CBD4F2AC224BE55477D5DE39C64A8300
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno_invalid_parameter_noinfo$_getptd
                                                                                                          • String ID:
                                                                                                          • API String ID: 1297830140-0
                                                                                                          • Opcode ID: 685b8ff2d911154aa2a8e8b67757949be9fab10ec942415c646d9afbcf8df801
                                                                                                          • Instruction ID: 7cefe7ca653a2f4658f3ee0a3df96f0f0be2bf27072e95f2b595b8178f122df2
                                                                                                          • Opcode Fuzzy Hash: 685b8ff2d911154aa2a8e8b67757949be9fab10ec942415c646d9afbcf8df801
                                                                                                          • Instruction Fuzzy Hash: 2441B132204B888AEB92EF15D5C43DD77A0F788BD5F568121EB8A43B92DF38C559C704
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$CountEnterInitializeSpin_amsg_exit_lockfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 3786353176-0
                                                                                                          • Opcode ID: 2d8fe9b17452f9be50c8f4dde2f5c65ad41ce5bf3704b10e52e00b94b0c4d927
                                                                                                          • Instruction ID: 77d012aec7b7a8e0eae38a5513b7aa1e5a3cf52bfde04b3ae6aefb7f7a7b0724
                                                                                                          • Opcode Fuzzy Hash: 2d8fe9b17452f9be50c8f4dde2f5c65ad41ce5bf3704b10e52e00b94b0c4d927
                                                                                                          • Instruction Fuzzy Hash: BC419132611F8882F7969B15E8803AC7761F758BD8F16C515EA590B2F1DF38CA89C748
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _errno$_invalid_parameter_noinfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2819658684-0
                                                                                                          • Opcode ID: 99ea2aa7fa037c728c670b1af3ab4c704a45c8a6972333f03af08050f1a032be
                                                                                                          • Instruction ID: a8714d15938ca0f6a90d651474b82c1258147739466bb9e11812dd49b4ea1a94
                                                                                                          • Opcode Fuzzy Hash: 99ea2aa7fa037c728c670b1af3ab4c704a45c8a6972333f03af08050f1a032be
                                                                                                          • Instruction Fuzzy Hash: B921C335614A8A85FBA3AB21A8013AF6391B74CBC4F06D421BA8987B85DF3DC705C744
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _amsg_exit$_getptd_lockfree
                                                                                                          • String ID:
                                                                                                          • API String ID: 2148533958-0
                                                                                                          • Opcode ID: 448ee291d70af40f8b290fc170a3ec04642eda76fc7755001fed3b988956531a
                                                                                                          • Instruction ID: 03751925d89ad7c75a090659d8e6fec9e03ae648af79c615cbbbc49a299d30f7
                                                                                                          • Opcode Fuzzy Hash: 448ee291d70af40f8b290fc170a3ec04642eda76fc7755001fed3b988956531a
                                                                                                          • Instruction Fuzzy Hash: F9110031215E4882EAD69B51E5817E973A4F78C7C8F499026FA4D037A6DF38C658CB05
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalDeleteSection$Freefree
                                                                                                          • String ID:
                                                                                                          • API String ID: 1250194111-0
                                                                                                          • Opcode ID: 9228b09e253a007911eda0d127ec13b25624cc88dbbd8a24fc5e966267fe7591
                                                                                                          • Instruction ID: 7a905e3c905827164463eee99df514b0c51316a8045c2e4bb92215e5cfa9d33c
                                                                                                          • Opcode Fuzzy Hash: 9228b09e253a007911eda0d127ec13b25624cc88dbbd8a24fc5e966267fe7591
                                                                                                          • Instruction Fuzzy Hash: 5011A731A41E88CAFFE68F11F4803987360F799BE8F598216F659022B5DF38C68D8705
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
                                                                                                          • String ID:
                                                                                                          • API String ID: 594724896-0
                                                                                                          • Opcode ID: 68e91f0215962c8046d3153dc38de0d0fe5a82dc01a661f0b9ce8fe4bd2a4dd0
                                                                                                          • Instruction ID: 0c0a23507bb2629b1bc646a7cbb6b0bd2226b194344c5b0705f97f05c29633ea
                                                                                                          • Opcode Fuzzy Hash: 68e91f0215962c8046d3153dc38de0d0fe5a82dc01a661f0b9ce8fe4bd2a4dd0
                                                                                                          • Instruction Fuzzy Hash: 53119435505E4892E6928B59E8C43DD7760F7C8BD8F22C225FA6A433B5CF79C649C708
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _amsg_exit_getptd$_lock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3670291111-0
                                                                                                          • Opcode ID: 1e2951db7288fe683079fa74c1d0abc9f5b6e3ca7d7c7624e94539af6c24109d
                                                                                                          • Instruction ID: 30bf2c9c459df01ed59fad58da7d5b88ae189090fbb2b18f494d1813002e01c0
                                                                                                          • Opcode Fuzzy Hash: 1e2951db7288fe683079fa74c1d0abc9f5b6e3ca7d7c7624e94539af6c24109d
                                                                                                          • Instruction Fuzzy Hash: 3EF0187170180881F6D6AB5184817ED2361E79C7C8F0A9175FA0D073D3DE24875CC719
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: cosfsinfwprintf
                                                                                                          • String ID: Cant normalize ZERO vector
                                                                                                          • API String ID: 478498997-1862362117
                                                                                                          • Opcode ID: 8f3b28573348b3f5bc6031dba9d50d39b873ffff9a8f37479b0f46ab6967f4a8
                                                                                                          • Instruction ID: f98a87a50659f58f53137574a4a326717961e7e6fcb01f50f0ee04a1c3ccac6a
                                                                                                          • Opcode Fuzzy Hash: 8f3b28573348b3f5bc6031dba9d50d39b873ffff9a8f37479b0f46ab6967f4a8
                                                                                                          • Instruction Fuzzy Hash: 08028633924B888AD352CB3790856AAB760FFAE3D4F299702FE44727B5DB35D5449B00
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000F.00000002.2151047013.0000000180001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000180000000, based on PE: true
                                                                                                          • Associated: 0000000F.00000002.2151028838.0000000180000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151082112.000000018004E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151099750.000000018005C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151116725.0000000180062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151131977.0000000180064000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151147650.0000000180068000.00000010.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 0000000F.00000002.2151162376.0000000180069000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_15_2_180000000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _ctrlfp$_exception_enabled_raise_excf_set_statfp
                                                                                                          • String ID: !$asinf
                                                                                                          • API String ID: 3072139147-2917828882
                                                                                                          • Opcode ID: ff56a0d4b1c6a47029269032c783d636fad6bda69c86f508603d91954b0104b9
                                                                                                          • Instruction ID: d0c98440cba4b73ae54bff3046531fc7f845b546b7e426e5b618ba2336869eec
                                                                                                          • Opcode Fuzzy Hash: ff56a0d4b1c6a47029269032c783d636fad6bda69c86f508603d91954b0104b9
                                                                                                          • Instruction Fuzzy Hash: C051AA329246CC86E2A3C73BA4813E6B750AFAD3C5F29C705F940756B5DF2A91995F00

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:5.7%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:4.8%
                                                                                                          Total number of Nodes:250
                                                                                                          Total number of Limit Nodes:22
                                                                                                          execution_graph 2562 273f41380 Sleep VirtualAllocEx 2563 273f4144e 2562->2563 2564 273f413d2 WriteProcessMemory 2562->2564 2564->2563 2565 273f41402 CreateRemoteThread 2564->2565 2565->2563 2566 273f4143c 2565->2566 2566->2563 2567 273f41440 WaitForSingleObject 2566->2567 2567->2563 2574 273f41540 2575 273f4154f 2574->2575 2578 273f41380 Sleep VirtualAllocEx 2575->2578 2579 273f4144e 2578->2579 2580 273f413d2 WriteProcessMemory 2578->2580 2580->2579 2581 273f41402 CreateRemoteThread 2580->2581 2581->2579 2582 273f4143c 2581->2582 2582->2579 2583 273f41440 WaitForSingleObject 2582->2583 2583->2579 2437 2c0cf991200 2438 2c0cf991215 2437->2438 2439 2c0cf99121f 2437->2439 2446 2c0cf991070 2438->2446 2442 2c0cf99122d 2439->2442 2445 2c0cf9911c0 VirtualAlloc 2439->2445 2443 2c0cf99123d 2443->2442 2449 2c0cf991190 2443->2449 2445->2443 2447 2c0cf991081 2446->2447 2448 2c0cf991085 VirtualQuery 2446->2448 2447->2439 2448->2447 2450 2c0cf9911a1 VirtualFree 2449->2450 2451 2c0cf9911b4 2449->2451 2450->2451 2451->2442 2452 2c0cf991000 2458 2c0cf992650 2452->2458 2473 2c0cf992050 2458->2473 2461 2c0cf9926b0 2462 2c0cf992702 SetLastError 2461->2462 2463 2c0cf992714 2461->2463 2470 2c0cf991055 ExitProcess 2462->2470 2464 2c0cf992741 SetLastError 2463->2464 2465 2c0cf992753 2463->2465 2464->2470 2466 2c0cf99276c 2465->2466 2472 2c0cf9927bb 2465->2472 2467 2c0cf992799 2466->2467 2468 2c0cf992787 SetLastError 2466->2468 2469 2c0cf992893 SetLastError 2467->2469 2467->2470 2468->2470 2469->2470 2471 2c0cf992876 SetLastError 2471->2470 2472->2467 2472->2471 2508 2c0cf991340 2473->2508 2476 2c0cf9920bf SetLastError 2506 2c0cf99103a 2476->2506 2477 2c0cf9920d1 2478 2c0cf991340 SetLastError 2477->2478 2479 2c0cf9920f8 2478->2479 2480 2c0cf99212c SetLastError 2479->2480 2481 2c0cf99213e 2479->2481 2479->2506 2480->2506 2482 2c0cf99214e SetLastError 2481->2482 2483 2c0cf992160 2481->2483 2482->2506 2484 2c0cf99216f SetLastError 2483->2484 2486 2c0cf992181 GetNativeSystemInfo 2483->2486 2484->2506 2487 2c0cf992288 SetLastError 2486->2487 2488 2c0cf99229a VirtualAlloc 2486->2488 2487->2506 2489 2c0cf9922ff GetProcessHeap HeapAlloc 2488->2489 2490 2c0cf9922c7 VirtualAlloc 2488->2490 2492 2c0cf99234b 2489->2492 2493 2c0cf992326 VirtualFree SetLastError 2489->2493 2490->2489 2491 2c0cf9922ed SetLastError 2490->2491 2491->2506 2494 2c0cf991340 SetLastError 2492->2494 2493->2506 2495 2c0cf9923fc 2494->2495 2496 2c0cf99240a VirtualAlloc 2495->2496 2497 2c0cf992400 2495->2497 2498 2c0cf992450 2496->2498 2539 2c0cf9928e0 2497->2539 2511 2c0cf991380 2498->2511 2501 2c0cf9924ac 2501->2497 2519 2c0cf991c80 2501->2519 2505 2c0cf992547 2505->2497 2505->2506 2507 2c0cf9925da SetLastError 2505->2507 2506->2461 2507->2497 2509 2c0cf99135f SetLastError 2508->2509 2510 2c0cf99136e 2508->2510 2509->2510 2510->2476 2510->2477 2510->2506 2516 2c0cf9913ce 2511->2516 2512 2c0cf99149c 2514 2c0cf991340 SetLastError 2512->2514 2513 2c0cf99141e VirtualAlloc 2513->2516 2518 2c0cf991458 2513->2518 2515 2c0cf9914c0 2514->2515 2517 2c0cf9914cb VirtualAlloc 2515->2517 2515->2518 2516->2512 2516->2513 2516->2518 2517->2518 2518->2501 2520 2c0cf991cdd IsBadReadPtr 2519->2520 2521 2c0cf991cd3 2519->2521 2520->2521 2523 2c0cf991d1c 2520->2523 2521->2497 2532 2c0cf991790 2521->2532 2523->2521 2524 2c0cf991d7d 2523->2524 2525 2c0cf991d65 SetLastError 2523->2525 2546 2c0cf991200 2524->2546 2525->2521 2528 2c0cf991db0 SetLastError 2528->2521 2530 2c0cf991de4 2530->2521 2531 2c0cf991f9c SetLastError 2530->2531 2531->2521 2533 2c0cf991830 2532->2533 2535 2c0cf991904 2533->2535 2537 2c0cf991987 2533->2537 2555 2c0cf9915e0 2533->2555 2534 2c0cf9915e0 2 API calls 2538 2c0cf99198b 2534->2538 2535->2505 2537->2534 2537->2538 2538->2505 2540 2c0cf992900 2539->2540 2544 2c0cf992905 2539->2544 2540->2506 2541 2c0cf9929b1 2542 2c0cf9929bd VirtualFree 2541->2542 2543 2c0cf9929d4 GetProcessHeap HeapFree 2541->2543 2542->2543 2543->2540 2544->2541 2545 2c0cf991190 VirtualFree 2544->2545 2545->2541 2547 2c0cf991215 2546->2547 2548 2c0cf99121f 2546->2548 2549 2c0cf991070 VirtualQuery 2547->2549 2551 2c0cf99122d 2548->2551 2554 2c0cf9911c0 VirtualAlloc 2548->2554 2549->2548 2551->2528 2551->2530 2552 2c0cf99123d 2552->2551 2553 2c0cf991190 VirtualFree 2552->2553 2553->2551 2554->2552 2556 2c0cf991608 2555->2556 2561 2c0cf9915fe 2555->2561 2558 2c0cf991619 2556->2558 2559 2c0cf99168c VirtualProtect 2556->2559 2557 2c0cf991664 VirtualFree 2557->2561 2558->2557 2558->2561 2559->2561 2561->2537 2584 2c0cf991fc0 LoadLibraryA 2585 2c0cf991fe6 2584->2585 2646 2c0cf992000 GetProcAddress 2586 273f417b0 2593 273f417c9 2586->2593 2587 273f4187e 2588 273f41902 2589 273f41740 3 API calls 2588->2589 2591 273f41911 2589->2591 2590 273f4183d VirtualQuery 2592 273f418e7 2590->2592 2590->2593 2592->2588 2594 273f41740 3 API calls 2592->2594 2593->2587 2593->2588 2593->2590 2595 273f41890 VirtualProtect 2593->2595 2594->2588 2595->2587 2596 273f418c8 GetLastError 2595->2596 2598 273f41740 2596->2598 2601 273f4176c 2598->2601 2599 273f4187e 2599->2593 2600 273f4183d VirtualQuery 2600->2599 2600->2601 2601->2599 2601->2600 2602 273f41890 VirtualProtect 2601->2602 2602->2599 2603 273f418c8 GetLastError 2602->2603 2603->2601 2647 273f41f70 2648 273f41f7f 2647->2648 2649 273f41fee 2648->2649 2650 273f41fd9 strncmp 2648->2650 2650->2648 2650->2649 2651 273f41670 2652 273f41679 2651->2652 2653 273f4167d 2652->2653 2654 273f41df0 3 API calls 2652->2654 2655 273f41695 2654->2655 2656 273f41470 2657 273f41380 5 API calls 2656->2657 2658 273f414a7 2657->2658 2659 2c0cf992405 2660 2c0cf99262c 2659->2660 2661 2c0cf9928e0 4 API calls 2660->2661 2662 2c0cf99263e 2661->2662 2663 273f41ceb 2664 273f41d10 calloc 2663->2664 2665 273f41d06 2663->2665 2664->2665 2666 273f41d27 EnterCriticalSection LeaveCriticalSection 2664->2666 2666->2665 2667 273f42559 VirtualAllocEx 2668 2c0cf992030 FreeLibrary 2608 273f416a0 2609 273f416b2 2608->2609 2610 273f416c2 2609->2610 2613 273f41df0 2609->2613 2612 273f41715 2614 273f41dfe 2613->2614 2615 273f41eb0 2613->2615 2616 273f41e04 2614->2616 2618 273f41e12 2614->2618 2620 273f41e50 2614->2620 2615->2612 2617 273f41ed0 InitializeCriticalSection 2616->2617 2616->2618 2617->2618 2618->2612 2619 273f41e89 DeleteCriticalSection 2619->2618 2620->2618 2620->2619 2621 273f41e78 free 2620->2621 2621->2619 2621->2621 2673 273f41d60 2674 273f41d72 2673->2674 2675 273f41d80 EnterCriticalSection 2673->2675 2676 273f41dc3 LeaveCriticalSection 2675->2676 2677 273f41d9c 2675->2677 2677->2676 2678 273f41dbe free 2677->2678 2678->2676 2622 2c0cf991cf6 2623 2c0cf991d04 IsBadReadPtr 2622->2623 2624 2c0cf991d1c 2623->2624 2625 2c0cf991fa9 2623->2625 2624->2625 2626 2c0cf991d7d 2624->2626 2627 2c0cf991d65 SetLastError 2624->2627 2628 2c0cf991200 3 API calls 2626->2628 2627->2625 2629 2c0cf991da3 2628->2629 2630 2c0cf991db0 SetLastError 2629->2630 2632 2c0cf991de4 2629->2632 2630->2625 2632->2625 2633 2c0cf991f9c SetLastError 2632->2633 2633->2625 2430 2c0cf9915e0 2431 2c0cf991608 2430->2431 2436 2c0cf9915fe 2430->2436 2433 2c0cf991619 2431->2433 2434 2c0cf99168c VirtualProtect 2431->2434 2432 2c0cf991664 VirtualFree 2432->2436 2433->2432 2433->2436 2434->2436 2634 2c0cf991860 2636 2c0cf991878 2634->2636 2635 2c0cf9915e0 2 API calls 2637 2c0cf99198b 2635->2637 2638 2c0cf9915e0 2 API calls 2636->2638 2639 2c0cf991904 2636->2639 2640 2c0cf991987 2636->2640 2638->2640 2640->2635 2640->2637 2568 273f414d0 2569 273f414e0 SleepEx 2568->2569 2569->2569 2683 273f41350 2684 273f42390 2683->2684 2685 273f423a7 _lock 2684->2685 2686 273f423db 2684->2686 2687 273f423b7 2685->2687 2688 273f423c4 _unlock 2687->2688 2689 273f4244e _unlock 2687->2689 2690 273f42409 2687->2690 2688->2686 2689->2686 2690->2688 2691 273f411d0 2692 273f41250 2691->2692 2695 273f411f0 2691->2695 2693 273f41265 2692->2693 2694 273f412a0 2692->2694 2697 273f41010 5 API calls 2693->2697 2696 273f414f0 5 API calls 2694->2696 2713 273f41229 2695->2713 2714 273f414f0 2695->2714 2699 273f4120c 2696->2699 2701 273f4126a 2697->2701 2699->2713 2718 273f41010 2699->2718 2702 273f412b8 2701->2702 2703 273f4127f 2701->2703 2701->2713 2706 273f41010 5 API calls 2702->2706 2702->2713 2704 273f41284 2703->2704 2707 273f412d8 2703->2707 2705 273f414f0 5 API calls 2704->2705 2705->2713 2706->2713 2708 273f414f0 5 API calls 2707->2708 2709 273f412ed 2708->2709 2710 273f414f0 5 API calls 2709->2710 2709->2713 2711 273f41305 2710->2711 2712 273f41010 5 API calls 2711->2712 2712->2713 2715 273f414f9 2714->2715 2716 273f4152c 2714->2716 2717 273f41380 5 API calls 2715->2717 2716->2699 2717->2716 2719 273f41026 2718->2719 2723 273f410a0 2718->2723 2720 273f41068 2719->2720 2721 273f41050 Sleep 2719->2721 2729 273f41084 2719->2729 2724 273f41140 2720->2724 2725 273f4107a _amsg_exit 2720->2725 2721->2719 2722 273f410e6 2728 273f41180 _initterm 2722->2728 2722->2729 2723->2722 2726 273f410d1 Sleep 2723->2726 2723->2729 2730 273f42460 2724->2730 2725->2729 2726->2723 2728->2729 2729->2713 2731 273f42474 2730->2731 2732 273f424bd 2731->2732 2733 273f424b5 free 2731->2733 2732->2729 2733->2732 2641 273f42591 DeleteCriticalSection

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3521962854.0000000273F41000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000000273F40000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3521946624.0000000273F40000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000010.00000002.3521962854.0000000273F85000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_273f40000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocCreateMemoryObjectProcessRemoteSingleSleepThreadVirtualWaitWrite
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3172812169-2766056989
                                                                                                          • Opcode ID: 7fcec4437536d1c811a67ff0d3e935be9d4b92fa0fac673d0b509e6aa8ba7f62
                                                                                                          • Instruction ID: 70ca693b3c1452cbeb4233b6b91bedeb956dc212f3bce1284f7759b325db5040
                                                                                                          • Opcode Fuzzy Hash: 7fcec4437536d1c811a67ff0d3e935be9d4b92fa0fac673d0b509e6aa8ba7f62
                                                                                                          • Instruction Fuzzy Hash: 5F117F22709E9042F6A0CF26BC08B5666A0B789FF4F644324EFBD17BE5DB38C6059605
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 633259c266d87a5b95fda6ce05470889e09af076b0dc8ff2f0ee963c60a24a3d
                                                                                                          • Instruction ID: 7fab87dd66e75dc0bfcff947ced448f477f0386d2d28368c8c6c5269dc7de3dc
                                                                                                          • Opcode Fuzzy Hash: 633259c266d87a5b95fda6ce05470889e09af076b0dc8ff2f0ee963c60a24a3d
                                                                                                          • Instruction Fuzzy Hash: 4911E770618B888FD6A4DF499889BAAB7E1FBD8711F544A2FE48CD3210C7319441C793
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fe48e069b0bf4257b6ece8509336bdb1b8fe3d1efb0e08b23792c235e305b72c
                                                                                                          • Instruction ID: 33bca329bb03c6a26a27ec47fd3475ce49b11827a73823d3fa8a9eb30fc3bc59
                                                                                                          • Opcode Fuzzy Hash: fe48e069b0bf4257b6ece8509336bdb1b8fe3d1efb0e08b23792c235e305b72c
                                                                                                          • Instruction Fuzzy Hash: 89F049B0628B448BE744DF1884C967977E1FBD8655F64452FE889C7361DB3198428B43
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ba3f95c2c9417701ba101d61fb74fecea45e223f9a8c54239b1753508d96a613
                                                                                                          • Instruction ID: 5960d9abacb1adefdf90835045597848b875249578ff9cd82e611af3837cc16a
                                                                                                          • Opcode Fuzzy Hash: ba3f95c2c9417701ba101d61fb74fecea45e223f9a8c54239b1753508d96a613
                                                                                                          • Instruction Fuzzy Hash: E4F044B0618B448BE744DF1884C967AB7E1FBD8755F24452FE899C7361DB319842CB43
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 611503c2f2b608366220324c20f94816b5761d40c9c053a388f9cbb19c4f0105
                                                                                                          • Instruction ID: c6fa763bf72b29af7094b9d4efacc01fcc47498973f5c5e69f833974aaf0e7ba
                                                                                                          • Opcode Fuzzy Hash: 611503c2f2b608366220324c20f94816b5761d40c9c053a388f9cbb19c4f0105
                                                                                                          • Instruction Fuzzy Hash: 13F05B70624F448BD704AF1C848AA7977D1F7D8655F54462EE444C7361DB35D5428B43

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 2c0cf992050-2c0cf99209a call 2c0cf991340 3 2c0cf99209c-2c0cf99209e 0->3 4 2c0cf9920a3-2c0cf9920bd 0->4 5 2c0cf992640-2c0cf992647 3->5 6 2c0cf9920bf-2c0cf9920cc SetLastError 4->6 7 2c0cf9920d1-2c0cf9920fa call 2c0cf991340 4->7 6->5 10 2c0cf9920fc-2c0cf9920fe 7->10 11 2c0cf992103-2c0cf99212a 7->11 10->5 12 2c0cf99212c-2c0cf992139 SetLastError 11->12 13 2c0cf99213e-2c0cf99214c 11->13 12->5 14 2c0cf99214e-2c0cf99215b SetLastError 13->14 15 2c0cf992160-2c0cf99216d 13->15 14->5 16 2c0cf99216f-2c0cf99217c SetLastError 15->16 17 2c0cf992181-2c0cf9921b1 15->17 16->5 18 2c0cf9921cb-2c0cf9921d8 17->18 19 2c0cf99222b-2c0cf992286 GetNativeSystemInfo 18->19 20 2c0cf9921da-2c0cf9921e3 18->20 23 2c0cf992288-2c0cf992295 SetLastError 19->23 24 2c0cf99229a-2c0cf9922c5 VirtualAlloc 19->24 21 2c0cf9921fc-2c0cf99220e 20->21 22 2c0cf9921e5-2c0cf9921fa 20->22 25 2c0cf992213-2c0cf99221d 21->25 22->25 23->5 26 2c0cf9922ff-2c0cf992324 GetProcessHeap HeapAlloc 24->26 27 2c0cf9922c7-2c0cf9922eb VirtualAlloc 24->27 31 2c0cf992229 25->31 32 2c0cf99221f-2c0cf992224 25->32 29 2c0cf99234b-2c0cf992369 26->29 30 2c0cf992326-2c0cf992346 VirtualFree SetLastError 26->30 27->26 28 2c0cf9922ed-2c0cf9922fa SetLastError 27->28 28->5 33 2c0cf99236b-2c0cf992373 29->33 34 2c0cf992375 29->34 30->5 31->18 32->31 36 2c0cf99237d-2c0cf9923fe call 2c0cf991340 33->36 34->36 39 2c0cf99240a-2c0cf9924a7 VirtualAlloc call 2c0cf991120 call 2c0cf991380 36->39 40 2c0cf992400 36->40 47 2c0cf9924ac-2c0cf9924ae 39->47 41 2c0cf99262c-2c0cf99263e call 2c0cf9928e0 40->41 41->5 48 2c0cf9924ba-2c0cf9924e3 47->48 49 2c0cf9924b0 47->49 50 2c0cf992509-2c0cf99250e 48->50 51 2c0cf9924e5-2c0cf992507 call 2c0cf991ab0 48->51 49->41 53 2c0cf992515-2c0cf992529 call 2c0cf991c80 50->53 51->53 57 2c0cf99252b 53->57 58 2c0cf992535-2c0cf992549 call 2c0cf991790 53->58 57->41 61 2c0cf99254b 58->61 62 2c0cf992555-2c0cf992569 call 2c0cf9919f0 58->62 61->41 65 2c0cf99256b 62->65 66 2c0cf992575-2c0cf992581 62->66 65->41 67 2c0cf992618-2c0cf99261d 66->67 68 2c0cf992587-2c0cf992590 66->68 71 2c0cf992625-2c0cf99262a 67->71 69 2c0cf992592-2c0cf9925d8 68->69 70 2c0cf9925f7-2c0cf992612 68->70 74 2c0cf9925e9-2c0cf9925f5 69->74 75 2c0cf9925da-2c0cf9925e5 SetLastError 69->75 72 2c0cf992616 70->72 71->5 72->71 74->72 75->41
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: 4d975507dabfc9bcff4ce07bface502bc42e706bf54c750510e23b7039734968
                                                                                                          • Instruction ID: 909283acd9b2741667af0c246a069474a563ec50a46a492be50126d098cad7fd
                                                                                                          • Opcode Fuzzy Hash: 4d975507dabfc9bcff4ce07bface502bc42e706bf54c750510e23b7039734968
                                                                                                          • Instruction Fuzzy Hash: 27F1E136619B84C6EB60CF15E494B6EB7A0F3C8B90F11511AEB8E87B64DF79C644CB01
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 0$@$@$`
                                                                                                          • API String ID: 0-307318802
                                                                                                          • Opcode ID: 790f92f7944892e3d38ff7d826f4987b9e3c0bb28676424d5e8019a2330f5ae1
                                                                                                          • Instruction ID: dbfde0de70f23c69d7b9deffb8303c0fcef56621f482790af599ed518272a6b4
                                                                                                          • Opcode Fuzzy Hash: 790f92f7944892e3d38ff7d826f4987b9e3c0bb28676424d5e8019a2330f5ae1
                                                                                                          • Instruction Fuzzy Hash: F0B10C70618B488FE764EF1CD885B9AB7E1FB98314F108A1EE499C3291DB74D9458B83
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000003.1799563429.000002C0CF9E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF9E0000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_3_2c0cf9e0000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID: 0-3916222277
                                                                                                          • Opcode ID: 9457dfe6ec60ebb388675859c3b208fc461dcabcf6edda219dbca694cf0c5acf
                                                                                                          • Instruction ID: 74f7d76f8572c9c4e9258e601c6b88ff189557193d55e82e5b90d1fc9a6791ce
                                                                                                          • Opcode Fuzzy Hash: 9457dfe6ec60ebb388675859c3b208fc461dcabcf6edda219dbca694cf0c5acf
                                                                                                          • Instruction Fuzzy Hash: 0CB17171618A08CFEB54EF1CD885B9EB7E1FB98310F01866EE489C7251DB34E945CB82

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: FreeVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 1263568516-0
                                                                                                          • Opcode ID: 75ce38d37ca8cf5b7d06ded007de5ea175a415d9990679de99291eeea22f5aae
                                                                                                          • Instruction ID: 436a6ae1a21cbb60b81ef6f8e37c3edf9697ab91149c42a215800db3aaa470a9
                                                                                                          • Opcode Fuzzy Hash: 75ce38d37ca8cf5b7d06ded007de5ea175a415d9990679de99291eeea22f5aae
                                                                                                          • Instruction Fuzzy Hash: 8651CA76618744CBEB60CF1AE484B1EB7A1F3C8B84F160116EA9D87754DB79D680CF01

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: 816fc88231aa2467bf2252115963d1d14762f6c5c40f282537df11a36abcc1ab
                                                                                                          • Instruction ID: 5fbf0cd2172acf7555c36ea4b3efd9f721022f47992632b50033c0debfe551dd
                                                                                                          • Opcode Fuzzy Hash: 816fc88231aa2467bf2252115963d1d14762f6c5c40f282537df11a36abcc1ab
                                                                                                          • Instruction Fuzzy Hash: 2A51DC76618B44C6DB60CB16E48461EB7B0F3C8BD4F11521AEE8E83B68DB79C681CF01

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 129 273f414d0-273f414dc 130 273f414e0-273f414e7 SleepEx 129->130 130->130
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3521962854.0000000273F41000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000000273F40000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3521946624.0000000273F40000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000010.00000002.3521962854.0000000273F85000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_273f40000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Sleep
                                                                                                          • String ID:
                                                                                                          • API String ID: 3472027048-0
                                                                                                          • Opcode ID: 490134546b41fa5f3525d4fc16026bee51ec6a607ddd3dfaa8bb0cc5ac4d8099
                                                                                                          • Instruction ID: 0bf00bace8f2674ea540bcf736f3f2282d979a864102f6c7b7d6f84e33ec7844
                                                                                                          • Opcode Fuzzy Hash: 490134546b41fa5f3525d4fc16026bee51ec6a607ddd3dfaa8bb0cc5ac4d8099
                                                                                                          • Instruction Fuzzy Hash: 06B09B14F04594C7E2255791B44D7699610B74FBD1F249451C55D13755851455425702

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 131 2c0cf9911c0-2c0cf9911f0 VirtualAlloc
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: AllocVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4275171209-0
                                                                                                          • Opcode ID: a26db5a74adc6119d098d68705d28c1916c0da013186a83d7531f391c9707544
                                                                                                          • Instruction ID: af7aedca85ea2e4c6ab80c5591e6c6d4722e649881127169f592680be277a219
                                                                                                          • Opcode Fuzzy Hash: a26db5a74adc6119d098d68705d28c1916c0da013186a83d7531f391c9707544
                                                                                                          • Instruction Fuzzy Hash: 50D092B6B14680C7DB289F25E455A0A6B64F389744FA04119EA8D47B68CA3EC7568F04

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3521962854.0000000273F41000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000000273F40000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3521946624.0000000273F40000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000010.00000002.3521962854.0000000273F85000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_273f40000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: QueryVirtual
                                                                                                          • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                                                                          • API String ID: 1804819252-1534286854
                                                                                                          • Opcode ID: 0cce06267e1579f90ae27719d32f235d794723324326edd454bf682594529e94
                                                                                                          • Instruction ID: 663189738c40874af7135dc25b0b982f4eec5aa8fa6ad61ed8319b582aa1f326
                                                                                                          • Opcode Fuzzy Hash: 0cce06267e1579f90ae27719d32f235d794723324326edd454bf682594529e94
                                                                                                          • Instruction Fuzzy Hash: CB41AF72F08F4482EB14DB51E8497DA77A0F789BE0F644220DA4D07BA5EB38C685E742

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1452528299-0
                                                                                                          • Opcode ID: 50d4aa64397910f34370dcdd3f25db7b3cd1b44d2d627c561aa8e3d7ca6c4d4e
                                                                                                          • Instruction ID: 1e91e9112e432eaf7b1e41f9f5f91464a16c52b9dc8ebd79983d0eaf110c0dee
                                                                                                          • Opcode Fuzzy Hash: 50d4aa64397910f34370dcdd3f25db7b3cd1b44d2d627c561aa8e3d7ca6c4d4e
                                                                                                          • Instruction Fuzzy Hash: 0D511E36618B44C7EB64CF1AE48472E77A0F7C8B94F11052AEA8E877A4DB7DC644CB05

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 229 273f41010-273f41024 230 273f41026-273f4102e 229->230 231 273f410a0-273f410a3 229->231 232 273f41089-273f41097 230->232 233 273f41030-273f4104e 230->233 234 273f41084 231->234 235 273f410a5-273f410c2 231->235 236 273f41058-273f41066 233->236 234->232 237 273f410d9-273f410e4 235->237 238 273f41068-273f41074 236->238 239 273f41050-273f41055 Sleep 236->239 240 273f410e6 237->240 241 273f410c8-273f410cb 237->241 242 273f41140-273f41155 call 273f42460 238->242 243 273f4107a-273f4107f _amsg_exit 238->243 239->236 246 273f410e8-273f410f4 240->246 244 273f41160-273f41165 241->244 245 273f410d1-273f410d6 Sleep 241->245 242->234 243->234 244->246 245->237 248 273f411c0-273f411ca call 273f424d8 246->248 249 273f410fa-273f410fe 246->249 252 273f41104-273f41109 248->252 249->252 253 273f41180-273f41199 _initterm 249->253 255 273f4110f-273f41111 252->255 256 273f411a0-273f411b9 call 273f424e0 252->256 253->252 257 273f41113-273f41120 255->257 258 273f41170-273f41175 255->258 256->255 260 273f41122-273f4112a 257->260 261 273f4112f-273f4113b 257->261 258->257 260->261 261->232
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3521962854.0000000273F41000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000000273F40000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3521946624.0000000273F40000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                          • Associated: 00000010.00000002.3521962854.0000000273F85000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_273f40000_rundll32.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Sleep_amsg_exit
                                                                                                          • String ID:
                                                                                                          • API String ID: 1015461914-0
                                                                                                          • Opcode ID: 1aa7096d3279892f89bb6938d1e8f798873b932fab0900364294d29769eafb3e
                                                                                                          • Instruction ID: b36ed253b1f92ff08f278adfa0ead6049e2a2874eebc081211355efa6209b103
                                                                                                          • Opcode Fuzzy Hash: 1aa7096d3279892f89bb6938d1e8f798873b932fab0900364294d29769eafb3e
                                                                                                          • Instruction Fuzzy Hash: 08417C31E0CA4885F765DB1AEC497AA2395B784BE4F744025DE0C87FA1EE28CA40B343

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000010.00000002.3522388941.000002C0CF990000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002C0CF990000, based on PE: true
                                                                                                          • Associated: 00000010.00000002.3522388941.000002C0CF9D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_16_2_2c0cf990000_rundll32.jbxd
                                                                                                          Yara matches
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 4100373531-0
                                                                                                          • Opcode ID: 5e3dd03f4e36ac629c9e35720315601d05ef0c3755c38ff15dc0a5ec62299b24
                                                                                                          • Instruction ID: 371d074c8419b86ea01d91347a663184eca4f71c6fb0dcff6967c2d587af26fa
                                                                                                          • Opcode Fuzzy Hash: 5e3dd03f4e36ac629c9e35720315601d05ef0c3755c38ff15dc0a5ec62299b24
                                                                                                          • Instruction Fuzzy Hash: 0E91A836219B88C6DB60CB4AE49475EB7B0F7C8B94F514116EA8E83B68DF7DC584CB00