Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sqx.dll.dll

Overview

General Information

Sample name:sqx.dll.dll
renamed because original name is a hash value
Original sample name:sqx.dll.exe
Analysis ID:1558851
MD5:dd862590d9e4ea1791df147912ae4c8f
SHA1:852d7a9ea4db5ff4cd51a92447a8d5701cfb322b
SHA256:14ffcbbfb305287ea15264df3363567f36a26917ae2018af0f40e2009b8a7184
Tags:exeuser-pr0xylife
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Potentially Suspicious Malware Callback Communication
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 6368 cmdline: loaddll64.exe "C:\Users\user\Desktop\sqx.dll.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 6304 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5480 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3980 cmdline: rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 280 cmdline: rundll32.exe C:\Users\user\Desktop\sqx.dll.dll,GetDbInterface MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3288 cmdline: rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",GetDbInterface MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 94.232.40.38, DestinationIsIpv6: false, DestinationPort: 4438, EventID: 3, Image: C:\Windows\System32\rundll32.exe, Initiated: true, ProcessId: 3980, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49730
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: sqx.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: edb.pdb source: rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, sqx.dll.dll
Source: Binary string: edb.pdbH source: rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, sqx.dll.dll

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.38 4438Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 46.249.49.83 4438Jump to behavior
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 94.232.40.38:4438
Source: global trafficTCP traffic: 192.168.2.4:49732 -> 46.249.49.83:4438
Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
Source: Joe Sandbox ViewASN Name: SERVERIUS-ASNL SERVERIUS-ASNL
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: uayyau.com
Source: global trafficDNS traffic detected: DNS query: guaaug.com
Source: global trafficDNS traffic detected: DNS query: 206.23.85.13.in-addr.arpa
Source: rundll32.exe, 00000003.00000003.3356345540.0000026AEB226000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB220000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795311394.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99927000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/0
Source: rundll32.exe, 00000003.00000003.3356345540.0000026AEB226000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB220000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795311394.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99927000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
Source: rundll32.exe, 00000003.00000003.3356329446.0000026AEB25D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99926000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
Source: rundll32.exe, 00000003.00000003.3356329446.0000026AEB25D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99926000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com/
Source: rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com/6
Source: rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com/r
Source: rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/
Source: rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/almaz.php
Source: rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/almaz.php6
Source: rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/riseCertificates
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/topaz.php
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/topaz.php.
Source: rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/topaz.phpile.Y
Source: rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://guaaug.com:4438/topaz.phpt
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2033321626.00000215495A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com/
Source: rundll32.exe, 00000005.00000003.3388057962.0000019B99928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com/ol
Source: rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com/u
Source: rundll32.exe, 00000004.00000003.2033321626.00000215495A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B99922000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/
Source: rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/1
Source: rundll32.exe, 00000003.00000003.3356345540.0000026AEB231000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3356290079.0000026AEB255000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/almaz.php
Source: rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/almaz.phpA
Source: rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/almaz.phpX4
Source: rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/almaz.phpt4
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/topaz.php
Source: rundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/topaz.phpho
Source: rundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/topaz.phpy
Source: rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://uayyau.com:4438/topaz.phpys.winy
Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000026AECD5D31D NtProtectVirtualMemory,3_3_0000026AECD5D31D
Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000026AECD5D2AD NtAllocateVirtualMemory,3_3_0000026AECD5D2AD
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01407924 NtAllocateVirtualMemory,3_2_00007FFE01407924
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD951C0 NtReadVirtualMemory,3_2_0000026AECD951C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD671B0 NtClose,3_2_0000026AECD671B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD78149 NtSetContextThread,3_2_0000026AECD78149
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD77A50 NtSetContextThread,3_2_0000026AECD77A50
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD94BE0 NtProtectVirtualMemory,3_2_0000026AECD94BE0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,3_2_0000026AECD7F3A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD94360 NtCreateThreadEx,3_2_0000026AECD94360
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD945F0 NtDuplicateObject,3_2_0000026AECD945F0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD755C0 NtClose,NtTerminateThread,3_2_0000026AECD755C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD94FF0 NtQueueApcThread,3_2_0000026AECD94FF0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD94740 NtFreeVirtualMemory,3_2_0000026AECD94740
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000215497FD31D NtProtectVirtualMemory,4_3_00000215497FD31D
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_00000215497FD2AD NtAllocateVirtualMemory,4_3_00000215497FD2AD
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549818149 NtSetContextThread,4_2_0000021549818149
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154981F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,4_2_000002154981F3A0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549834BE0 NtProtectVirtualMemory,4_2_0000021549834BE0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549834FF0 NtQueueApcThread,4_2_0000021549834FF0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549834740 NtFreeVirtualMemory,4_2_0000021549834740
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549834360 NtCreateThreadEx,4_2_0000021549834360
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549817A50 NtSetContextThread,4_2_0000021549817A50
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498351C0 NtReadVirtualMemory,4_2_00000215498351C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498155C0 NtClose,NtTerminateThread,4_2_00000215498155C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498345F0 NtDuplicateObject,4_2_00000215498345F0
Source: C:\Windows\System32\rundll32.exeCode function: 5_3_0000019B998BD31D NtProtectVirtualMemory,5_3_0000019B998BD31D
Source: C:\Windows\System32\rundll32.exeCode function: 5_3_0000019B998BD2AD NtAllocateVirtualMemory,5_3_0000019B998BD2AD
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013431503_2_00007FFE01343150
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F61503_2_00007FFE013F6150
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E71703_2_00007FFE013E7170
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B22003_2_00007FFE013B2200
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013C62103_2_00007FFE013C6210
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0139B1F03_2_00007FFE0139B1F0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013531103_2_00007FFE01353110
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E83903_2_00007FFE013E8390
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013DE3403_2_00007FFE013DE340
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0139F4203_2_00007FFE0139F420
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013662803_2_00007FFE01366280
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013482B03_2_00007FFE013482B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0138E2603_2_00007FFE0138E260
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0134D3103_2_00007FFE0134D310
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0135F3303_2_00007FFE0135F330
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013922C73_2_00007FFE013922C7
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013782C83_2_00007FFE013782C8
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013DD2F03_2_00007FFE013DD2F0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A05803_2_00007FFE013A0580
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013685903_2_00007FFE01368590
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B35703_2_00007FFE013B3570
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A15703_2_00007FFE013A1570
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013635C03_2_00007FFE013635C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013884803_2_00007FFE01388480
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013614903_2_00007FFE01361490
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A74A03_2_00007FFE013A74A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013324403_2_00007FFE01332440
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0136F4E03_2_00007FFE0136F4E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0137C7903_2_00007FFE0137C790
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013367A03_2_00007FFE013367A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013BA7B03_2_00007FFE013BA7B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013328003_2_00007FFE01332800
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B28203_2_00007FFE013B2820
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013456803_2_00007FFE01345680
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013D46903_2_00007FFE013D4690
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0134E6A03_2_00007FFE0134E6A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0139B6B03_2_00007FFE0139B6B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0136A6403_2_00007FFE0136A640
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A56503_2_00007FFE013A5650
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013C57103_2_00007FFE013C5710
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0133C9903_2_00007FFE0133C990
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013FB95C3_2_00007FFE013FB95C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013D79503_2_00007FFE013D7950
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01346A203_2_00007FFE01346A20
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013CCA303_2_00007FFE013CCA30
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A98A03_2_00007FFE013A98A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0138B8A03_2_00007FFE0138B8A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B18573_2_00007FFE013B1857
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013CD8503_2_00007FFE013CD850
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013EF8603_2_00007FFE013EF860
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E49003_2_00007FFE013E4900
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013378D03_2_00007FFE013378D0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01387B803_2_00007FFE01387B80
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E2B403_2_00007FFE013E2B40
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B0C303_2_00007FFE013B0C30
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0139DA703_2_00007FFE0139DA70
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0134CB203_2_00007FFE0134CB20
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013C9AD03_2_00007FFE013C9AD0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0139CD903_2_00007FFE0139CD90
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01385DB03_2_00007FFE01385DB0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013D4DB03_2_00007FFE013D4DB0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013B5E203_2_00007FFE013B5E20
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013AFE303_2_00007FFE013AFE30
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01340DD03_2_00007FFE01340DD0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01388DD03_2_00007FFE01388DD0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E5C403_2_00007FFE013E5C40
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01351C603_2_00007FFE01351C60
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01377C7A3_2_00007FFE01377C7A
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E7F703_2_00007FFE013E7F70
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013E10003_2_00007FFE013E1000
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE0136AEB03_2_00007FFE0136AEB0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A1F103_2_00007FFE013A1F10
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE01339F203_2_00007FFE01339F20
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD755C03_2_0000026AECD755C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD872203_2_0000026AECD87220
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD902103_2_0000026AECD90210
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD699D03_2_0000026AECD699D0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD742A03_2_0000026AECD742A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD882A03_2_0000026AECD882A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD8FBC03_2_0000026AECD8FBC0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD82BB03_2_0000026AECD82BB0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7CBE03_2_0000026AECD7CBE0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD813A33_2_0000026AECD813A3
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD695003_2_0000026AECD69500
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7B4E03_2_0000026AECD7B4E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD914903_2_0000026AECD91490
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD74DB03_2_0000026AECD74DB0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD855E03_2_0000026AECD855E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD8B5E03_2_0000026AECD8B5E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD65D603_2_0000026AECD65D60
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD845503_2_0000026AECD84550
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD666C03_2_0000026AECD666C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD866E03_2_0000026AECD866E0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7BED03_2_0000026AECD7BED0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD716A03_2_0000026AECD716A0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD928123_2_0000026AECD92812
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD91F403_2_0000026AECD91F40
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD6A7303_2_0000026AECD6A730
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD92F603_2_0000026AECD92F60
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7A1003_2_0000026AECD7A100
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD791203_2_0000026AECD79120
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498155C04_2_00000215498155C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154981A1004_2_000002154981A100
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498095004_2_0000021549809500
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498191204_2_0000021549819120
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498245504_2_0000021549824550
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549805D604_2_0000021549805D60
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498314904_2_0000021549831490
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154981B4E04_2_000002154981B4E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498328124_2_0000021549832812
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498213A34_2_00000215498213A3
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549822BB04_2_0000021549822BB0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154982FBC04_2_000002154982FBC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154981CBE04_2_000002154981CBE0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154980A7304_2_000002154980A730
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549831F404_2_0000021549831F40
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549832F604_2_0000021549832F60
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498282A04_2_00000215498282A0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498116A04_2_00000215498116A0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498142A04_2_00000215498142A0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498066C04_2_00000215498066C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154981BED04_2_000002154981BED0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498266E04_2_00000215498266E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498302104_2_0000021549830210
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498272204_2_0000021549827220
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000021549814DB04_2_0000021549814DB0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498099D04_2_00000215498099D0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002154982B5E04_2_000002154982B5E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000215498255E04_2_00000215498255E0
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFE0137EA80 appears 127 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFE013599C0 appears 40 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FFE01360740 appears 167 times
Source: sqx.dll.dllBinary or memory string: OriginalFilenameedb.dll< vs sqx.dll.dll
Source: sqx.dll.dllStatic PE information: Section: .rsrc ZLIB complexity 0.9957094637423936
Source: classification engineClassification label: mal64.evad.winDLL@10/0@5/2
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD7F3A0 CreateToolhelp32Snapshot,Thread32First,NtSuspendThread,NtResumeThread,Thread32Next,NtClose,3_2_0000026AECD7F3A0
Source: C:\Windows\System32\rundll32.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6304:120:WilError_03
Source: sqx.dll.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\sqx.dll.dll,GetDbInterface
Source: rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: rundll32.exe, rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\sqx.dll.dll"
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\sqx.dll.dll,GetDbInterface
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",GetDbInterface
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\sqx.dll.dll,GetDbInterfaceJump to behavior
Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",GetDbInterfaceJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: sqx.dll.dllStatic PE information: Image base 0x180000000 > 0x60000000
Source: sqx.dll.dllStatic file information: File size 1330688 > 1048576
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: sqx.dll.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: sqx.dll.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: edb.pdb source: rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, sqx.dll.dll
Source: Binary string: edb.pdbH source: rundll32.exe, 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000004.00000002.3548941510.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000005.00000002.3548914792.00007FFE01408000.00000002.00000001.01000000.00000003.sdmp, sqx.dll.dll
Source: sqx.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: sqx.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: sqx.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: sqx.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: sqx.dll.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F0290 LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00007FFE013F0290
Source: sqx.dll.dllStatic PE information: real checksum: 0x11271d should be: 0x14702c
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013A3B5F push D8E80007h; retf 3_2_00007FFE013A3B65
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,3_2_0000026AECD84D00
Source: C:\Windows\System32\rundll32.exeCode function: GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,4_2_0000021549824D00
Source: C:\Windows\System32\rundll32.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_3-81795
Source: C:\Windows\System32\rundll32.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\loaddll64.exe TID: 6324Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB231000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3356345540.0000026AEB231000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2033321626.00000215495CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495CD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795311394.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B9994F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: rundll32.exe, 00000003.00000002.3547931750.0000026AEB231000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3356345540.0000026AEB231000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWc
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD6CCE0 LdrGetProcedureAddress,3_2_0000026AECD6CCE0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F12C0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFE013F12C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F0290 LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00007FFE013F0290
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F12C0 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFE013F12C0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F0568 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FFE013F0568
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013F6EC8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FFE013F6EC8

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.38 4438Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 46.249.49.83 4438Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 3980Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 3980Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 280Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 280Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 3980Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 3980Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: 3980 1Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,3_2_00007FFE014022E0
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_00007FFE01402648
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_00007FFE01402718
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_00007FFE013FA9A8
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_00007FFE01402B58
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,3_2_00007FFE013FAD3C
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00007FFE01402D3C
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00007FFE013310B0 GetSystemTimeAsFileTime,3_2_00007FFE013310B0
Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000026AECD84D00 GetUserNameW,GetComputerNameExW,GetComputerNameExW,GetTokenInformation,GetNativeSystemInfo,GetAdaptersInfo,GetAdaptersInfo,3_2_0000026AECD84D00
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
311
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
311
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync1
System Network Configuration Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem12
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
sqx.dll.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://guaaug.com:4438/riseCertificates0%Avira URL Cloudsafe
https://uayyau.com:4438/10%Avira URL Cloudsafe
https://uayyau.com:4438/almaz.php0%Avira URL Cloudsafe
https://uayyau.com/ol0%Avira URL Cloudsafe
https://guaaug.com:4438/almaz.php60%Avira URL Cloudsafe
https://uayyau.com:4438/almaz.phpX40%Avira URL Cloudsafe
https://uayyau.com/u0%Avira URL Cloudsafe
https://uayyau.com:4438/topaz.phpho0%Avira URL Cloudsafe
https://guaaug.com:4438/topaz.php0%Avira URL Cloudsafe
https://uayyau.com:4438/topaz.phpys.winy0%Avira URL Cloudsafe
https://uayyau.com:4438/topaz.phpy0%Avira URL Cloudsafe
https://guaaug.com/0%Avira URL Cloudsafe
https://guaaug.com:4438/topaz.php.0%Avira URL Cloudsafe
https://guaaug.com/r0%Avira URL Cloudsafe
https://guaaug.com:4438/topaz.phpt0%Avira URL Cloudsafe
https://guaaug.com:4438/0%Avira URL Cloudsafe
https://guaaug.com:4438/topaz.phpile.Y0%Avira URL Cloudsafe
https://guaaug.com:4438/almaz.php0%Avira URL Cloudsafe
https://uayyau.com:4438/topaz.php0%Avira URL Cloudsafe
https://uayyau.com:4438/almaz.phpt40%Avira URL Cloudsafe
https://uayyau.com:4438/0%Avira URL Cloudsafe
https://guaaug.com/60%Avira URL Cloudsafe
https://uayyau.com/0%Avira URL Cloudsafe
https://uayyau.com:4438/almaz.phpA0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
guaaug.com
46.249.49.83
truetrue
    unknown
    uayyau.com
    94.232.40.38
    truetrue
      unknown
      206.23.85.13.in-addr.arpa
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        https://uayyau.com:4438/topaz.phphorundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://uayyau.com:4438/almaz.phpX4rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://uayyau.com:4438/topaz.phpys.winyrundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://guaaug.com:4438/topaz.phprundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://uayyau.com/urundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://r10.o.lencr.org0#rundll32.exe, 00000003.00000003.3356345540.0000026AEB226000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB220000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795311394.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99927000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://uayyau.com:4438/1rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://uayyau.com:4438/almaz.phprundll32.exe, 00000003.00000003.3356345540.0000026AEB231000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.3356290079.0000026AEB255000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://uayyau.com/olrundll32.exe, 00000005.00000003.3388057962.0000019B99928000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://guaaug.com:4438/almaz.php6rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://guaaug.com:4438/riseCertificatesrundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://uayyau.com:4438/topaz.phpyrundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://x1.c.lencr.org/0rundll32.exe, 00000003.00000003.3356329446.0000026AEB25D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99926000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://x1.i.lencr.org/0rundll32.exe, 00000003.00000003.3356329446.0000026AEB25D000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99926000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              https://guaaug.com:4438/topaz.phptrundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com:4438/topaz.php.rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com/rrundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com/rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com:4438/rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://uayyau.com:4438/topaz.phprundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2033321626.0000021549586000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com:4438/topaz.phpile.Yrundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://uayyau.com:4438/almaz.phpt4rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://guaaug.com:4438/almaz.phprundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://uayyau.com:4438/rundll32.exe, 00000004.00000003.2033321626.00000215495A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B99922000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://uayyau.com:4438/almaz.phpArundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://r10.i.lencr.org/0rundll32.exe, 00000003.00000003.3356345540.0000026AEB226000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB220000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB254000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.0000021549548000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2896272792.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795311394.0000019B9994F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132908868.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548460425.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99962000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795202518.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548128726.0000019B998E8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2795222053.0000019B99927000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.2132981768.0000019B99962000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://guaaug.com/6rundll32.exe, 00000004.00000002.3548009227.00000215495DE000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://uayyau.com/rundll32.exe, 00000003.00000002.3547931750.0000026AEB1C8000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.3548009227.000002154959E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2033321626.00000215495A6000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000002.3548487916.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3387995089.0000019B99968000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000005.00000003.3388057962.0000019B99928000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                94.232.40.38
                uayyau.comRussian Federation
                44477WELLWEBNLtrue
                46.249.49.83
                guaaug.comNetherlands
                50673SERVERIUS-ASNLtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1558851
                Start date and time:2024-11-19 21:33:45 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 29s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:10
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:sqx.dll.dll
                renamed because original name is a hash value
                Original Sample Name:sqx.dll.exe
                Detection:MAL
                Classification:mal64.evad.winDLL@10/0@5/2
                EGA Information:
                • Successful, ratio: 66.7%
                HCA Information:
                • Successful, ratio: 97%
                • Number of executed functions: 23
                • Number of non-executed functions: 114
                Cookbook Comments:
                • Found application associated with file extension: .dll
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target rundll32.exe, PID 3288 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: sqx.dll.dll
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                94.232.40.38merd.msiGet hashmaliciousUnknownBrowse
                  46.249.49.83merd.msiGet hashmaliciousUnknownBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    guaaug.commerd.msiGet hashmaliciousUnknownBrowse
                    • 46.249.49.83
                    uayyau.commerd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WELLWEBNLmerd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.213
                    81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                    • 94.232.45.36
                    JeZHGKJvrB.exeGet hashmaliciousUnknownBrowse
                    • 94.232.44.144
                    hFoVk4DJXG.exeGet hashmaliciousUnknownBrowse
                    • 94.232.44.144
                    JbZaDxFXF3.exeGet hashmaliciousNetSupport RATBrowse
                    • 94.232.42.28
                    file.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                    • 94.232.45.38
                    SERVERIUS-ASNLmerd.msiGet hashmaliciousUnknownBrowse
                    • 46.249.49.83
                    https://www.packs.nl/tracktrace/?zendingnr=UT1301675937&pc6hnr=4813XCGet hashmaliciousPhisherBrowse
                    • 195.238.75.6
                    pitU5Y4aKy.jsGet hashmaliciousUnknownBrowse
                    • 188.119.112.115
                    la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                    • 185.79.113.7
                    la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                    • 178.19.118.180
                    https://www.filemail.com/t/cFCAI9C4Get hashmaliciousHtmlDropperBrowse
                    • 178.21.23.182
                    SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                    • 91.210.175.3
                    SecuriteInfo.com.PUA.Tool.InstSrv.3.16098.13705.exeGet hashmaliciousUnknownBrowse
                    • 91.210.175.3
                    81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                    • 46.249.49.17
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Entropy (8bit):6.910483690960765
                    TrID:
                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                    • Win64 Executable (generic) (12005/4) 10.17%
                    • Generic Win/DOS Executable (2004/3) 1.70%
                    • DOS Executable Generic (2002/1) 1.70%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                    File name:sqx.dll.dll
                    File size:1'330'688 bytes
                    MD5:dd862590d9e4ea1791df147912ae4c8f
                    SHA1:852d7a9ea4db5ff4cd51a92447a8d5701cfb322b
                    SHA256:14ffcbbfb305287ea15264df3363567f36a26917ae2018af0f40e2009b8a7184
                    SHA512:3e9222d8bd91d3e53f5e378318a78a7c5aa12011272031f7c0d8c36c5b255db1d0a168cc02e1159eb021dd18206352dd6dcb857fefc2222937c467350dc6d568
                    SSDEEP:24576:pQrDp6J8JM3IgVvF7EtPCo1Frk5fRJhqYEjTvpAbHT0HRZonw4by:pQpI8JM3IwEtPCo1F45fvhq/jTyb4HR+
                    TLSH:FB55BF46F3B900BCD857C2788A675607EBB274052364DBDB4690866A6F33FE11A7E334
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O...............@.......@.......@........~.......~.......~.. ...@.......................C...[...C.......C.........r.....C......
                    Icon Hash:7ae282899bbab082
                    Entrypoint:0x1800c0e30
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x180000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
                    Time Stamp:0x671FB409 [Mon Oct 28 15:55:53 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:9a0edf641145d454a005af877887e965
                    Signature Valid:
                    Signature Issuer:
                    Signature Validation Error:
                    Error Number:
                    Not Before, Not After
                      Subject Chain
                        Version:
                        Thumbprint MD5:
                        Thumbprint SHA-1:
                        Thumbprint SHA-256:
                        Serial:
                        Instruction
                        dec eax
                        mov dword ptr [esp+08h], ebx
                        dec eax
                        mov dword ptr [esp+10h], esi
                        push edi
                        dec eax
                        sub esp, 20h
                        dec ecx
                        mov edi, eax
                        mov ebx, edx
                        dec eax
                        mov esi, ecx
                        cmp edx, 01h
                        jne 00007F6720E8CB87h
                        call 00007F6720E8CBE4h
                        dec esp
                        mov eax, edi
                        mov edx, ebx
                        dec eax
                        mov ecx, esi
                        dec eax
                        mov ebx, dword ptr [esp+30h]
                        dec eax
                        mov esi, dword ptr [esp+38h]
                        dec eax
                        add esp, 20h
                        pop edi
                        jmp 00007F6720E8CA20h
                        int3
                        int3
                        int3
                        dec eax
                        sub esp, 48h
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F6720E8C1D7h
                        dec eax
                        lea edx, dword ptr [00039033h]
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F6720E8E41Ah
                        int3
                        dec eax
                        sub esp, 48h
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F6720DCDE87h
                        dec eax
                        lea edx, dword ptr [0003911Bh]
                        dec eax
                        lea ecx, dword ptr [esp+20h]
                        call 00007F6720E8E3FAh
                        int3
                        dec eax
                        mov dword ptr [esp+18h], ebx
                        push ebp
                        dec eax
                        mov ebp, esp
                        dec eax
                        sub esp, 30h
                        dec eax
                        mov eax, dword ptr [0003A1BCh]
                        dec eax
                        mov ebx, 2DDFA232h
                        cdq
                        sub eax, dword ptr [eax]
                        add byte ptr [eax+3Bh], cl
                        ret
                        jne 00007F6720E8CBF6h
                        dec eax
                        and dword ptr [ebp+10h], 00000000h
                        dec eax
                        lea ecx, dword ptr [ebp+10h]
                        call dword ptr [00017156h]
                        dec eax
                        mov eax, dword ptr [ebp+10h]
                        dec eax
                        mov dword ptr [ebp-10h], eax
                        call dword ptr [00017298h]
                        mov eax, eax
                        dec eax
                        xor dword ptr [ebp-10h], eax
                        call dword ptr [00000000h]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0xfa0100x4c.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xfa05c0x28.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x10a0000x3d9ac.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1000000x90c0.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x107a000x5370
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1480000x10e0.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0xee5100x70.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xee3d00x140.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0xd80000x2a0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000xd68900xd6a00cc0ddbedc7c30a59a1a8c7fb34340f71False0.5615513067850902data6.455181281656058IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0xd80000x229160x22a0062b2e76722f0feec6815cddc086dca12False0.42075389214801445data5.596240788025772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xfb0000x4e380x38007290f63eebf151d7085a937dae9047e2False0.13288225446428573data2.1663059532354643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x1000000x90c00x92004247303e0773d644b24c430bcd71f30eFalse0.4702482876712329data5.995125976590941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x10a0000x3d9ac0x3da00102a9dba4e2b1d28c4c32281255c4d0fFalse0.9957094637423936data7.9979650032296865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x1480000x10e00x12005c0a3338fc3861202f586a99ba86a90bFalse0.4728732638888889data5.405877006582534IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_BITMAP0x10a0e80x3d39ddata0.9987000610094066
                        RT_VERSION0x1474880x3a4dataEnglishUnited States0.47854077253218885
                        RT_MANIFEST0x14782c0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                        DLLImport
                        KERNEL32.dllGetFileSize, DeleteFileW, GetTempPathW, FlushFileBuffers, GetFileInformationByHandle, LockFileEx, UnlockFileEx, GetSystemTimeAsFileTime, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, TryEnterCriticalSection, SetFilePointer, LoadLibraryW, GetProcAddress, FreeLibrary, GetCurrentProcess, GetLocaleInfoW, GetModuleFileNameW, LoadLibraryExW, WideCharToMultiByte, MultiByteToWideChar, GetFullPathNameW, WriteConsoleW, GetConsoleMode, GetConsoleOutputCP, HeapSize, SetStdHandle, GetStringTypeW, SetEndOfFile, WriteFile, ReadFile, FindClose, FindNextFileW, FindFirstFileExW, Sleep, GetLastError, GetCurrentProcessId, GetModuleHandleW, GetTickCount, InitializeCriticalSection, SetLastError, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, InitializeSListHead, GetStartupInfoW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, InterlockedFlushSList, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, HeapAlloc, HeapFree, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, HeapReAlloc, GetStdHandle, GetFileType, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap
                        NameOrdinalAddress
                        GetDbInterface10x1800041d0
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Nov 19, 2024 21:34:41.799674034 CET497304438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.804588079 CET44384973094.232.40.38192.168.2.4
                        Nov 19, 2024 21:34:41.804668903 CET497304438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.817966938 CET497314438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.822916031 CET44384973194.232.40.38192.168.2.4
                        Nov 19, 2024 21:34:41.822989941 CET497314438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.826225042 CET497304438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.831083059 CET44384973094.232.40.38192.168.2.4
                        Nov 19, 2024 21:34:41.874057055 CET497314438192.168.2.494.232.40.38
                        Nov 19, 2024 21:34:41.878859043 CET44384973194.232.40.38192.168.2.4
                        Nov 19, 2024 21:34:44.918771029 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:44.923585892 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:34:44.923674107 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:44.931293964 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:44.936137915 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:34:51.759507895 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:34:51.759533882 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:34:51.759552002 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:34:51.759612083 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:51.759612083 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:51.796564102 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:34:51.801448107 CET44384973246.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:13.877382040 CET497304438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:13.939884901 CET497314438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:23.830657959 CET497324438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:39.938237906 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.943149090 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:35:39.943232059 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.943485022 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.949122906 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:35:39.984078884 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.989552975 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:35:39.989609003 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.989818096 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:35:39.995136976 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:35:54.904489994 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:54.909359932 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:54.909442902 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:54.911418915 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:54.917674065 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:58.005455971 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:58.005573034 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:58.005604029 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:58.005639076 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:35:58.005660057 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:58.005660057 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:58.005660057 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:58.005707026 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:58.010798931 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:35:58.015594006 CET44385224946.249.49.83192.168.2.4
                        Nov 19, 2024 21:36:08.042356968 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.042424917 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.042469025 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.042476892 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.042521000 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.042521000 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.045488119 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.045532942 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.045552015 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.045578003 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.045583010 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.045624971 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.045630932 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.045675039 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.059282064 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.061731100 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:08.064532042 CET44385215294.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:08.066628933 CET44385215494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:30.065094948 CET522494438192.168.2.446.249.49.83
                        Nov 19, 2024 21:36:40.158710003 CET521544438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:40.174515963 CET521524438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:57.274498940 CET523944438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:57.280174971 CET44385239494.232.40.38192.168.2.4
                        Nov 19, 2024 21:36:57.280371904 CET523944438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:57.280688047 CET523944438192.168.2.494.232.40.38
                        Nov 19, 2024 21:36:57.286942005 CET44385239494.232.40.38192.168.2.4
                        Nov 19, 2024 21:37:26.354265928 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.354545116 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.359277010 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:26.359358072 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.359461069 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:26.359527111 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.359910011 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.359967947 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:26.364948034 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:26.364978075 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.610488892 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.610548973 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.610584021 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.610603094 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.610629082 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.610645056 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.612641096 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.612696886 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.612726927 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.612730980 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.612782955 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.612783909 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.615492105 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.615788937 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.620310068 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.620642900 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.789757013 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.789820910 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.793634892 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.793709040 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.798880100 CET523964438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.803776026 CET44385239646.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:28.804122925 CET523954438192.168.2.446.249.49.83
                        Nov 19, 2024 21:37:28.809055090 CET44385239546.249.49.83192.168.2.4
                        Nov 19, 2024 21:37:29.346527100 CET523944438192.168.2.494.232.40.38
                        TimestampSource PortDest PortSource IPDest IP
                        Nov 19, 2024 21:34:41.623991013 CET6026553192.168.2.41.1.1.1
                        Nov 19, 2024 21:34:41.782665014 CET53602651.1.1.1192.168.2.4
                        Nov 19, 2024 21:34:44.601665020 CET5718953192.168.2.41.1.1.1
                        Nov 19, 2024 21:34:44.913929939 CET53571891.1.1.1192.168.2.4
                        Nov 19, 2024 21:35:10.041002035 CET5352259162.159.36.2192.168.2.4
                        Nov 19, 2024 21:35:10.514581919 CET5984653192.168.2.41.1.1.1
                        Nov 19, 2024 21:35:10.577364922 CET53598461.1.1.1192.168.2.4
                        Nov 19, 2024 21:36:57.114876986 CET5386053192.168.2.41.1.1.1
                        Nov 19, 2024 21:36:57.273436069 CET53538601.1.1.1192.168.2.4
                        Nov 19, 2024 21:37:26.194266081 CET5905253192.168.2.41.1.1.1
                        Nov 19, 2024 21:37:26.353324890 CET53590521.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Nov 19, 2024 21:34:41.623991013 CET192.168.2.41.1.1.10xd806Standard query (0)uayyau.comA (IP address)IN (0x0001)false
                        Nov 19, 2024 21:34:44.601665020 CET192.168.2.41.1.1.10x60dfStandard query (0)guaaug.comA (IP address)IN (0x0001)false
                        Nov 19, 2024 21:35:10.514581919 CET192.168.2.41.1.1.10xb944Standard query (0)206.23.85.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        Nov 19, 2024 21:36:57.114876986 CET192.168.2.41.1.1.10x2d1dStandard query (0)uayyau.comA (IP address)IN (0x0001)false
                        Nov 19, 2024 21:37:26.194266081 CET192.168.2.41.1.1.10xfcc2Standard query (0)guaaug.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Nov 19, 2024 21:34:41.782665014 CET1.1.1.1192.168.2.40xd806No error (0)uayyau.com94.232.40.38A (IP address)IN (0x0001)false
                        Nov 19, 2024 21:34:44.913929939 CET1.1.1.1192.168.2.40x60dfNo error (0)guaaug.com46.249.49.83A (IP address)IN (0x0001)false
                        Nov 19, 2024 21:35:10.577364922 CET1.1.1.1192.168.2.40xb944Name error (3)206.23.85.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                        Nov 19, 2024 21:36:57.273436069 CET1.1.1.1192.168.2.40x2d1dNo error (0)uayyau.com94.232.40.38A (IP address)IN (0x0001)false
                        Nov 19, 2024 21:37:26.353324890 CET1.1.1.1192.168.2.40xfcc2No error (0)guaaug.com46.249.49.83A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:15:34:37
                        Start date:19/11/2024
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\sqx.dll.dll"
                        Imagebase:0x7ff67ede0000
                        File size:165'888 bytes
                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:1
                        Start time:15:34:37
                        Start date:19/11/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:2
                        Start time:15:34:37
                        Start date:19/11/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1
                        Imagebase:0x7ff7160f0000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:3
                        Start time:15:34:37
                        Start date:19/11/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\sqx.dll.dll,GetDbInterface
                        Imagebase:0x7ff7191b0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:4
                        Start time:15:34:37
                        Start date:19/11/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",#1
                        Imagebase:0x7ff7191b0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:5
                        Start time:15:34:40
                        Start date:19/11/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\sqx.dll.dll",GetDbInterface
                        Imagebase:0x7ff7191b0000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:1.6%
                          Dynamic/Decrypted Code Coverage:98.6%
                          Signature Coverage:30.1%
                          Total number of Nodes:937
                          Total number of Limit Nodes:37
                          execution_graph 81461 26aecd67bf0 81462 26aecd67c06 81461->81462 81478 26aecd62930 81462->81478 81464 26aecd67c24 81617 26aecd68ed0 81464->81617 81466 26aecd67d64 81650 26aecd67f70 81466->81650 81468 26aecd67d8c 81791 26aecd84d00 GetUserNameW GetComputerNameExW 81468->81791 81470 26aecd67f54 81471 26aecd67da4 81471->81470 81823 26aecd94740 81471->81823 81475 26aecd78c60 CreateFiber DeleteFiber 81476 26aecd67e3b 81475->81476 81476->81470 81476->81475 81477 26aecd74700 RtlFreeHeap 81476->81477 81827 26aecd73d90 7 API calls 81476->81827 81828 26aecd68bc0 9 API calls 81476->81828 81477->81476 81829 26aecd6ffe0 81478->81829 81484 26aecd62943 81485 26aecd6f5f5 81484->81485 81901 26aecd6cce0 81484->81901 81485->81464 81488 26aecd6cce0 LdrGetProcedureAddress 81489 26aecd6ee2b 81488->81489 81490 26aecd6cce0 LdrGetProcedureAddress 81489->81490 81491 26aecd6ee54 81490->81491 81492 26aecd6cce0 LdrGetProcedureAddress 81491->81492 81493 26aecd6ee73 81492->81493 81494 26aecd6cce0 LdrGetProcedureAddress 81493->81494 81495 26aecd6ee92 81494->81495 81496 26aecd6cce0 LdrGetProcedureAddress 81495->81496 81497 26aecd6eeb1 81496->81497 81498 26aecd6cce0 LdrGetProcedureAddress 81497->81498 81499 26aecd6eed0 81498->81499 81500 26aecd6cce0 LdrGetProcedureAddress 81499->81500 81501 26aecd6eeef 81500->81501 81502 26aecd6cce0 LdrGetProcedureAddress 81501->81502 81503 26aecd6ef0e 81502->81503 81504 26aecd6cce0 LdrGetProcedureAddress 81503->81504 81505 26aecd6ef2d 81504->81505 81506 26aecd6cce0 LdrGetProcedureAddress 81505->81506 81507 26aecd6ef4c 81506->81507 81508 26aecd6cce0 LdrGetProcedureAddress 81507->81508 81509 26aecd6ef6b 81508->81509 81510 26aecd6cce0 LdrGetProcedureAddress 81509->81510 81511 26aecd6ef8a 81510->81511 81512 26aecd6cce0 LdrGetProcedureAddress 81511->81512 81513 26aecd6efa9 81512->81513 81514 26aecd6cce0 LdrGetProcedureAddress 81513->81514 81515 26aecd6efc8 81514->81515 81516 26aecd6cce0 LdrGetProcedureAddress 81515->81516 81517 26aecd6efe7 81516->81517 81518 26aecd6cce0 LdrGetProcedureAddress 81517->81518 81519 26aecd6f006 81518->81519 81520 26aecd6cce0 LdrGetProcedureAddress 81519->81520 81521 26aecd6f025 81520->81521 81522 26aecd6cce0 LdrGetProcedureAddress 81521->81522 81523 26aecd6f044 81522->81523 81524 26aecd6cce0 LdrGetProcedureAddress 81523->81524 81525 26aecd6f063 81524->81525 81526 26aecd6cce0 LdrGetProcedureAddress 81525->81526 81527 26aecd6f082 81526->81527 81528 26aecd6cce0 LdrGetProcedureAddress 81527->81528 81529 26aecd6f0a1 81528->81529 81530 26aecd6cce0 LdrGetProcedureAddress 81529->81530 81531 26aecd6f0c0 81530->81531 81532 26aecd6cce0 LdrGetProcedureAddress 81531->81532 81533 26aecd6f0df 81532->81533 81534 26aecd6cce0 LdrGetProcedureAddress 81533->81534 81535 26aecd6f0fe 81534->81535 81536 26aecd6cce0 LdrGetProcedureAddress 81535->81536 81537 26aecd6f11d 81536->81537 81538 26aecd6cce0 LdrGetProcedureAddress 81537->81538 81539 26aecd6f13c 81538->81539 81540 26aecd6cce0 LdrGetProcedureAddress 81539->81540 81541 26aecd6f15b 81540->81541 81542 26aecd6cce0 LdrGetProcedureAddress 81541->81542 81543 26aecd6f17a 81542->81543 81544 26aecd6cce0 LdrGetProcedureAddress 81543->81544 81545 26aecd6f199 81544->81545 81546 26aecd6cce0 LdrGetProcedureAddress 81545->81546 81547 26aecd6f1b8 81546->81547 81548 26aecd6cce0 LdrGetProcedureAddress 81547->81548 81549 26aecd6f1d7 81548->81549 81550 26aecd6cce0 LdrGetProcedureAddress 81549->81550 81551 26aecd6f1f6 81550->81551 81552 26aecd6cce0 LdrGetProcedureAddress 81551->81552 81553 26aecd6f215 81552->81553 81554 26aecd6cce0 LdrGetProcedureAddress 81553->81554 81555 26aecd6f234 81554->81555 81556 26aecd6cce0 LdrGetProcedureAddress 81555->81556 81557 26aecd6f253 81556->81557 81558 26aecd6cce0 LdrGetProcedureAddress 81557->81558 81559 26aecd6f272 81558->81559 81560 26aecd6cce0 LdrGetProcedureAddress 81559->81560 81561 26aecd6f291 81560->81561 81562 26aecd6cce0 LdrGetProcedureAddress 81561->81562 81563 26aecd6f2b0 81562->81563 81564 26aecd6cce0 LdrGetProcedureAddress 81563->81564 81565 26aecd6f2cf 81564->81565 81566 26aecd6cce0 LdrGetProcedureAddress 81565->81566 81567 26aecd6f2ee 81566->81567 81568 26aecd6cce0 LdrGetProcedureAddress 81567->81568 81569 26aecd6f30d 81568->81569 81570 26aecd6cce0 LdrGetProcedureAddress 81569->81570 81571 26aecd6f32c 81570->81571 81572 26aecd6cce0 LdrGetProcedureAddress 81571->81572 81573 26aecd6f34b 81572->81573 81574 26aecd6cce0 LdrGetProcedureAddress 81573->81574 81575 26aecd6f36a 81574->81575 81576 26aecd6cce0 LdrGetProcedureAddress 81575->81576 81577 26aecd6f389 81576->81577 81578 26aecd6cce0 LdrGetProcedureAddress 81577->81578 81579 26aecd6f3a8 81578->81579 81580 26aecd6cce0 LdrGetProcedureAddress 81579->81580 81581 26aecd6f3c7 81580->81581 81582 26aecd6cce0 LdrGetProcedureAddress 81581->81582 81583 26aecd6f3e6 81582->81583 81584 26aecd6cce0 LdrGetProcedureAddress 81583->81584 81585 26aecd6f405 81584->81585 81586 26aecd6cce0 LdrGetProcedureAddress 81585->81586 81587 26aecd6f424 81586->81587 81588 26aecd6cce0 LdrGetProcedureAddress 81587->81588 81589 26aecd6f443 81588->81589 81590 26aecd6cce0 LdrGetProcedureAddress 81589->81590 81591 26aecd6f462 81590->81591 81592 26aecd6cce0 LdrGetProcedureAddress 81591->81592 81593 26aecd6f481 81592->81593 81594 26aecd6cce0 LdrGetProcedureAddress 81593->81594 81595 26aecd6f4a0 81594->81595 81596 26aecd6cce0 LdrGetProcedureAddress 81595->81596 81597 26aecd6f4bf 81596->81597 81598 26aecd6cce0 LdrGetProcedureAddress 81597->81598 81599 26aecd6f4de 81598->81599 81600 26aecd6cce0 LdrGetProcedureAddress 81599->81600 81601 26aecd6f4fd 81600->81601 81602 26aecd6cce0 LdrGetProcedureAddress 81601->81602 81603 26aecd6f51c 81602->81603 81604 26aecd6cce0 LdrGetProcedureAddress 81603->81604 81605 26aecd6f53b 81604->81605 81606 26aecd6cce0 LdrGetProcedureAddress 81605->81606 81607 26aecd6f55a 81606->81607 81608 26aecd6cce0 LdrGetProcedureAddress 81607->81608 81609 26aecd6f579 81608->81609 81610 26aecd6cce0 LdrGetProcedureAddress 81609->81610 81611 26aecd6f598 81610->81611 81612 26aecd6cce0 LdrGetProcedureAddress 81611->81612 81613 26aecd6f5b7 81612->81613 81614 26aecd6cce0 LdrGetProcedureAddress 81613->81614 81615 26aecd6f5d6 81614->81615 81616 26aecd6cce0 LdrGetProcedureAddress 81615->81616 81616->81485 81905 26aecd84ce0 81617->81905 81622 26aecd93de0 RtlFreeHeap 81623 26aecd690af 81622->81623 81624 26aecd93de0 RtlFreeHeap 81623->81624 81625 26aecd69110 81624->81625 81626 26aecd93de0 RtlFreeHeap 81625->81626 81627 26aecd6916c 81626->81627 81628 26aecd93de0 RtlFreeHeap 81627->81628 81629 26aecd691a1 81628->81629 81630 26aecd93de0 RtlFreeHeap 81629->81630 81631 26aecd691f1 81630->81631 81632 26aecd93de0 RtlFreeHeap 81631->81632 81633 26aecd69222 81632->81633 81634 26aecd93de0 RtlFreeHeap 81633->81634 81635 26aecd6925a 81634->81635 81636 26aecd93de0 RtlFreeHeap 81635->81636 81637 26aecd692af 81636->81637 81638 26aecd93de0 RtlFreeHeap 81637->81638 81639 26aecd692f1 81638->81639 81640 26aecd93de0 RtlFreeHeap 81639->81640 81641 26aecd69333 81640->81641 81642 26aecd93de0 RtlFreeHeap 81641->81642 81643 26aecd69347 81642->81643 81644 26aecd93de0 RtlFreeHeap 81643->81644 81645 26aecd69362 81644->81645 81646 26aecd93de0 RtlFreeHeap 81645->81646 81647 26aecd6938e 81646->81647 81648 26aecd93de0 RtlFreeHeap 81647->81648 81649 26aecd693c1 81648->81649 81649->81466 81651 26aecd67fb8 81650->81651 81652 26aecd67f99 81650->81652 81654 26aecd67fda 81651->81654 81655 26aecd93de0 RtlFreeHeap 81651->81655 81653 26aecd93de0 RtlFreeHeap 81652->81653 81653->81651 81915 26aecd85560 81654->81915 81655->81654 81659 26aecd85560 RtlFreeHeap 81663 26aecd68066 81659->81663 81660 26aecd6802a 81660->81659 81661 26aecd68088 81662 26aecd85560 RtlFreeHeap 81661->81662 81667 26aecd6809c 81662->81667 81663->81661 81665 26aecd8b4e0 RtlFreeHeap 81663->81665 81664 26aecd680be 81666 26aecd85560 RtlFreeHeap 81664->81666 81665->81661 81671 26aecd680d2 81666->81671 81667->81664 81668 26aecd8b4e0 RtlFreeHeap 81667->81668 81668->81664 81669 26aecd680f4 81670 26aecd85560 RtlFreeHeap 81669->81670 81675 26aecd68108 81670->81675 81671->81669 81672 26aecd8b4e0 RtlFreeHeap 81671->81672 81672->81669 81673 26aecd6812a 81674 26aecd85560 RtlFreeHeap 81673->81674 81679 26aecd6813e 81674->81679 81675->81673 81676 26aecd8b4e0 RtlFreeHeap 81675->81676 81676->81673 81677 26aecd68160 81678 26aecd85560 RtlFreeHeap 81677->81678 81683 26aecd68174 81678->81683 81679->81677 81680 26aecd8b4e0 RtlFreeHeap 81679->81680 81680->81677 81681 26aecd68197 81682 26aecd85560 RtlFreeHeap 81681->81682 81687 26aecd681ab 81682->81687 81683->81681 81685 26aecd8b4e0 RtlFreeHeap 81683->81685 81684 26aecd681d4 81686 26aecd85560 RtlFreeHeap 81684->81686 81685->81681 81688 26aecd681e8 81686->81688 81687->81684 81689 26aecd8b4e0 RtlFreeHeap 81687->81689 81690 26aecd6823d 81688->81690 81920 26aecd7be20 RtlFreeHeap 81688->81920 81689->81684 81691 26aecd85560 RtlFreeHeap 81690->81691 81712 26aecd68251 81691->81712 81693 26aecd68214 81697 26aecd8b4e0 RtlFreeHeap 81693->81697 81694 26aecd6838a 81695 26aecd85560 RtlFreeHeap 81694->81695 81696 26aecd6839e 81695->81696 81699 26aecd85560 RtlFreeHeap 81696->81699 81698 26aecd68235 81697->81698 81700 26aecd8b4e0 RtlFreeHeap 81698->81700 81704 26aecd683ba 81699->81704 81700->81690 81701 26aecd68b86 81701->81468 81702 26aecd68430 81703 26aecd85560 RtlFreeHeap 81702->81703 81705 26aecd68444 81703->81705 81704->81701 81704->81702 81717 26aecd8b4e0 RtlFreeHeap 81704->81717 81706 26aecd6846d 81705->81706 81923 26aecd7be20 RtlFreeHeap 81705->81923 81715 26aecd85560 RtlFreeHeap 81706->81715 81707 26aecd6835d 81709 26aecd8b4e0 RtlFreeHeap 81707->81709 81708 26aecd68322 81708->81707 81922 26aecd6a050 RtlFreeHeap 81708->81922 81713 26aecd6837d 81709->81713 81712->81694 81712->81708 81921 26aecd6a050 RtlFreeHeap 81712->81921 81718 26aecd8b4e0 RtlFreeHeap 81713->81718 81714 26aecd68460 81719 26aecd8b4e0 RtlFreeHeap 81714->81719 81716 26aecd6848e 81715->81716 81721 26aecd684b7 81716->81721 81924 26aecd7be20 RtlFreeHeap 81716->81924 81722 26aecd68423 81717->81722 81718->81694 81719->81706 81726 26aecd85560 RtlFreeHeap 81721->81726 81724 26aecd8b4e0 RtlFreeHeap 81722->81724 81724->81702 81725 26aecd684aa 81727 26aecd8b4e0 RtlFreeHeap 81725->81727 81728 26aecd684d8 81726->81728 81727->81721 81729 26aecd68501 81728->81729 81925 26aecd7be20 RtlFreeHeap 81728->81925 81731 26aecd85560 RtlFreeHeap 81729->81731 81733 26aecd68522 81731->81733 81732 26aecd684f4 81734 26aecd8b4e0 RtlFreeHeap 81732->81734 81735 26aecd6854b 81733->81735 81926 26aecd7be20 RtlFreeHeap 81733->81926 81734->81729 81738 26aecd85560 RtlFreeHeap 81735->81738 81737 26aecd6853e 81739 26aecd8b4e0 RtlFreeHeap 81737->81739 81740 26aecd6856c 81738->81740 81739->81735 81741 26aecd68595 81740->81741 81927 26aecd7be20 RtlFreeHeap 81740->81927 81743 26aecd85560 RtlFreeHeap 81741->81743 81745 26aecd685b6 81743->81745 81744 26aecd68588 81746 26aecd8b4e0 RtlFreeHeap 81744->81746 81747 26aecd85560 RtlFreeHeap 81745->81747 81746->81741 81748 26aecd685d2 81747->81748 81748->81701 81749 26aecd8b4e0 RtlFreeHeap 81748->81749 81750 26aecd68625 81749->81750 81751 26aecd8b4e0 RtlFreeHeap 81750->81751 81752 26aecd6865e 81751->81752 81753 26aecd85560 RtlFreeHeap 81752->81753 81754 26aecd68672 81753->81754 81754->81701 81755 26aecd8b4e0 RtlFreeHeap 81754->81755 81756 26aecd68797 81755->81756 81757 26aecd8b4e0 RtlFreeHeap 81756->81757 81758 26aecd687a4 81757->81758 81759 26aecd85560 RtlFreeHeap 81758->81759 81760 26aecd687b8 81759->81760 81760->81701 81761 26aecd8b4e0 RtlFreeHeap 81760->81761 81762 26aecd687ec 81761->81762 81763 26aecd85560 RtlFreeHeap 81762->81763 81764 26aecd68800 81763->81764 81764->81701 81765 26aecd8b4e0 RtlFreeHeap 81764->81765 81766 26aecd6882d 81765->81766 81767 26aecd85560 RtlFreeHeap 81766->81767 81768 26aecd68841 81767->81768 81769 26aecd85560 RtlFreeHeap 81768->81769 81770 26aecd6885d 81769->81770 81770->81701 81771 26aecd8b4e0 RtlFreeHeap 81770->81771 81772 26aecd68897 81771->81772 81773 26aecd85560 RtlFreeHeap 81772->81773 81774 26aecd688ab 81773->81774 81774->81701 81775 26aecd8b4e0 RtlFreeHeap 81774->81775 81776 26aecd689c8 81775->81776 81777 26aecd8b4e0 RtlFreeHeap 81776->81777 81778 26aecd689d5 81777->81778 81779 26aecd85560 RtlFreeHeap 81778->81779 81788 26aecd689eb 81779->81788 81780 26aecd68aec 81790 26aecd68b47 81780->81790 81929 26aecd7be20 RtlFreeHeap 81780->81929 81781 26aecd8b4e0 RtlFreeHeap 81783 26aecd68b79 81781->81783 81785 26aecd8b4e0 RtlFreeHeap 81783->81785 81785->81701 81786 26aecd68b2a 81789 26aecd8b4e0 RtlFreeHeap 81786->81789 81787 26aecd8b4e0 RtlFreeHeap 81787->81788 81788->81701 81788->81780 81788->81787 81928 26aecd7be20 RtlFreeHeap 81788->81928 81789->81790 81790->81781 81792 26aecd84dc7 GetComputerNameExW 81791->81792 81793 26aecd84db1 81791->81793 81794 26aecd84def 81792->81794 81793->81792 81795 26aecd84df3 GetTokenInformation 81794->81795 81800 26aecd84e4e 81794->81800 81796 26aecd84e1c 81795->81796 81795->81800 81797 26aecd84e3e 81796->81797 81798 26aecd93de0 RtlFreeHeap 81796->81798 81799 26aecd93de0 RtlFreeHeap 81797->81799 81798->81797 81799->81800 81930 26aecd7dfc0 81800->81930 81803 26aecd84eaa GetNativeSystemInfo 81805 26aecd84ed3 81803->81805 81806 26aecd84ee8 81803->81806 81804 26aecd93de0 RtlFreeHeap 81804->81803 81808 26aecd93de0 RtlFreeHeap 81805->81808 81806->81805 81807 26aecd84f17 81806->81807 81809 26aecd93de0 RtlFreeHeap 81807->81809 81810 26aecd84f15 81808->81810 81809->81810 81812 26aecd93de0 RtlFreeHeap 81810->81812 81818 26aecd84f67 81810->81818 81811 26aecd84f8f GetAdaptersInfo 81813 26aecd84fbb 81811->81813 81814 26aecd84fdd 81811->81814 81812->81818 81815 26aecd8b4e0 RtlFreeHeap 81813->81815 81814->81813 81817 26aecd84fea GetAdaptersInfo 81814->81817 81816 26aecd84fc5 81815->81816 81819 26aecd8b4e0 RtlFreeHeap 81816->81819 81817->81813 81822 26aecd84fff 81817->81822 81818->81811 81820 26aecd84fcd 81819->81820 81820->81471 81821 26aecd93de0 RtlFreeHeap 81821->81822 81822->81813 81822->81821 81824 26aecd94759 81823->81824 81825 26aecd947af 81824->81825 81826 26aecd947ad NtFreeVirtualMemory 81824->81826 81825->81476 81826->81825 81827->81476 81828->81476 81831 26aecd6fff9 81829->81831 81830 26aecd62939 81849 26aecd6f8a0 81830->81849 81831->81830 81832 26aecd6cce0 LdrGetProcedureAddress 81831->81832 81833 26aecd70072 81832->81833 81834 26aecd6cce0 LdrGetProcedureAddress 81833->81834 81835 26aecd7008d 81834->81835 81836 26aecd6cce0 LdrGetProcedureAddress 81835->81836 81837 26aecd700b6 81836->81837 81838 26aecd6cce0 LdrGetProcedureAddress 81837->81838 81839 26aecd700d5 81838->81839 81840 26aecd6cce0 LdrGetProcedureAddress 81839->81840 81841 26aecd700f4 81840->81841 81842 26aecd6cce0 LdrGetProcedureAddress 81841->81842 81843 26aecd70113 81842->81843 81844 26aecd6cce0 LdrGetProcedureAddress 81843->81844 81845 26aecd70132 81844->81845 81846 26aecd6cce0 LdrGetProcedureAddress 81845->81846 81847 26aecd70151 81846->81847 81848 26aecd6cce0 LdrGetProcedureAddress 81847->81848 81848->81830 81850 26aecd6f8da 81849->81850 81851 26aecd6293e 81850->81851 81852 26aecd6cce0 LdrGetProcedureAddress 81850->81852 81857 26aecd73470 81851->81857 81853 26aecd6f900 81852->81853 81854 26aecd6cce0 LdrGetProcedureAddress 81853->81854 81855 26aecd6f91b 81854->81855 81856 26aecd6cce0 LdrGetProcedureAddress 81855->81856 81856->81851 81859 26aecd73489 81857->81859 81858 26aecd73493 81858->81484 81859->81858 81860 26aecd6cce0 LdrGetProcedureAddress 81859->81860 81861 26aecd73502 81860->81861 81862 26aecd6cce0 LdrGetProcedureAddress 81861->81862 81863 26aecd7351d 81862->81863 81864 26aecd6cce0 LdrGetProcedureAddress 81863->81864 81865 26aecd73546 81864->81865 81866 26aecd6cce0 LdrGetProcedureAddress 81865->81866 81867 26aecd73565 81866->81867 81868 26aecd6cce0 LdrGetProcedureAddress 81867->81868 81869 26aecd73584 81868->81869 81870 26aecd6cce0 LdrGetProcedureAddress 81869->81870 81871 26aecd735a3 81870->81871 81872 26aecd6cce0 LdrGetProcedureAddress 81871->81872 81873 26aecd735c2 81872->81873 81874 26aecd6cce0 LdrGetProcedureAddress 81873->81874 81875 26aecd735e1 81874->81875 81876 26aecd6cce0 LdrGetProcedureAddress 81875->81876 81877 26aecd73600 81876->81877 81878 26aecd6cce0 LdrGetProcedureAddress 81877->81878 81879 26aecd7361f 81878->81879 81880 26aecd6cce0 LdrGetProcedureAddress 81879->81880 81881 26aecd7363e 81880->81881 81882 26aecd6cce0 LdrGetProcedureAddress 81881->81882 81883 26aecd7365d 81882->81883 81884 26aecd6cce0 LdrGetProcedureAddress 81883->81884 81885 26aecd7367c 81884->81885 81886 26aecd6cce0 LdrGetProcedureAddress 81885->81886 81887 26aecd7369b 81886->81887 81888 26aecd6cce0 LdrGetProcedureAddress 81887->81888 81889 26aecd736ba 81888->81889 81890 26aecd6cce0 LdrGetProcedureAddress 81889->81890 81891 26aecd736d9 81890->81891 81892 26aecd6cce0 LdrGetProcedureAddress 81891->81892 81893 26aecd736f8 81892->81893 81894 26aecd6cce0 LdrGetProcedureAddress 81893->81894 81895 26aecd73717 81894->81895 81896 26aecd6cce0 LdrGetProcedureAddress 81895->81896 81897 26aecd73736 81896->81897 81898 26aecd6cce0 LdrGetProcedureAddress 81897->81898 81899 26aecd73755 81898->81899 81900 26aecd6cce0 LdrGetProcedureAddress 81899->81900 81900->81858 81903 26aecd6cd1b 81901->81903 81902 26aecd6cdbf 81902->81488 81903->81902 81904 26aecd6cd9b LdrGetProcedureAddress 81903->81904 81904->81902 81906 26aecd68eee CreateMutexExA 81905->81906 81907 26aecd93de0 81906->81907 81909 26aecd93e14 81907->81909 81908 26aecd68f71 81908->81622 81909->81908 81911 26aecd8b4e0 81909->81911 81912 26aecd8b523 81911->81912 81913 26aecd8b4f0 81911->81913 81912->81909 81913->81912 81914 26aecd8b511 RtlFreeHeap 81913->81914 81914->81912 81916 26aecd68016 81915->81916 81917 26aecd8557b 81915->81917 81916->81660 81919 26aecd7be20 RtlFreeHeap 81916->81919 81917->81916 81918 26aecd8b4e0 RtlFreeHeap 81917->81918 81918->81916 81919->81660 81920->81693 81921->81712 81922->81707 81923->81714 81924->81725 81925->81732 81926->81737 81927->81744 81928->81788 81929->81786 81932 26aecd7dff1 81930->81932 81931 26aecd7e03d 81931->81803 81931->81804 81932->81931 81933 26aecd8b4e0 RtlFreeHeap 81932->81933 81933->81931 81934 26aecd67830 81935 26aecd6788a InternetOpenW 81934->81935 81936 26aecd67885 81934->81936 81937 26aecd67898 InternetConnectW 81935->81937 81953 26aecd67aed 81935->81953 81936->81935 81938 26aecd678dd HttpOpenRequestW 81937->81938 81937->81953 81941 26aecd67931 81938->81941 81938->81953 81939 26aecd67b0e InternetCloseHandle 81942 26aecd67b17 81939->81942 81940 26aecd67b60 81944 26aecd679cb HttpSendRequestA 81941->81944 81941->81953 81942->81940 81943 26aecd67b56 81942->81943 81947 26aecd67b8c 81942->81947 81943->81940 81945 26aecd8b4e0 RtlFreeHeap 81943->81945 81946 26aecd679e4 81944->81946 81944->81953 81945->81940 81951 26aecd8b4e0 RtlFreeHeap 81946->81951 81954 26aecd67a24 81946->81954 81955 26aecd6a050 RtlFreeHeap 81947->81955 81949 26aecd67ba4 81950 26aecd8b4e0 RtlFreeHeap 81949->81950 81950->81940 81951->81954 81952 26aecd8b4e0 RtlFreeHeap 81952->81953 81953->81939 81953->81942 81954->81952 81955->81949 81956 26aecd671b0 81957 26aecd671c6 81956->81957 81964 26aecd62950 81957->81964 81959 26aecd671f5 81981 26aecd94360 81959->81981 81963 26aecd6732d 81989 26aecd716a0 81964->81989 81966 26aecd62959 82161 26aecd701a0 81966->82161 81968 26aecd62963 81969 26aecd70f99 81968->81969 81970 26aecd6cce0 LdrGetProcedureAddress 81968->81970 81969->81959 81971 26aecd70ef8 81970->81971 81972 26aecd6cce0 LdrGetProcedureAddress 81971->81972 81973 26aecd70f13 81972->81973 81974 26aecd6cce0 LdrGetProcedureAddress 81973->81974 81975 26aecd70f3c 81974->81975 81976 26aecd6cce0 LdrGetProcedureAddress 81975->81976 81977 26aecd70f5b 81976->81977 81978 26aecd6cce0 LdrGetProcedureAddress 81977->81978 81979 26aecd70f7a 81978->81979 81980 26aecd6cce0 LdrGetProcedureAddress 81979->81980 81980->81969 81982 26aecd943bd 81981->81982 81983 26aecd6730e 81982->81983 81984 26aecd9444e NtCreateThreadEx 81982->81984 81985 26aecd94ff0 81983->81985 81984->81983 81987 26aecd95011 81985->81987 81986 26aecd9506c 81986->81963 81987->81986 81988 26aecd9506a NtQueueApcThread 81987->81988 81988->81986 81990 26aecd716a9 81989->81990 81991 26aecd721e1 81990->81991 81992 26aecd6cce0 LdrGetProcedureAddress 81990->81992 81991->81966 81993 26aecd716c8 81992->81993 81994 26aecd6cce0 LdrGetProcedureAddress 81993->81994 81995 26aecd716e0 81994->81995 81996 26aecd6cce0 LdrGetProcedureAddress 81995->81996 81997 26aecd716f8 81996->81997 81998 26aecd6cce0 LdrGetProcedureAddress 81997->81998 81999 26aecd71710 81998->81999 82000 26aecd6cce0 LdrGetProcedureAddress 81999->82000 82001 26aecd71728 82000->82001 82002 26aecd6cce0 LdrGetProcedureAddress 82001->82002 82003 26aecd71740 82002->82003 82004 26aecd6cce0 LdrGetProcedureAddress 82003->82004 82005 26aecd71758 82004->82005 82006 26aecd6cce0 LdrGetProcedureAddress 82005->82006 82007 26aecd71770 82006->82007 82008 26aecd6cce0 LdrGetProcedureAddress 82007->82008 82009 26aecd71788 82008->82009 82010 26aecd6cce0 LdrGetProcedureAddress 82009->82010 82011 26aecd717a0 82010->82011 82012 26aecd6cce0 LdrGetProcedureAddress 82011->82012 82013 26aecd717b8 82012->82013 82014 26aecd6cce0 LdrGetProcedureAddress 82013->82014 82015 26aecd717d0 82014->82015 82016 26aecd6cce0 LdrGetProcedureAddress 82015->82016 82017 26aecd717e8 82016->82017 82018 26aecd6cce0 LdrGetProcedureAddress 82017->82018 82019 26aecd71800 82018->82019 82020 26aecd6cce0 LdrGetProcedureAddress 82019->82020 82021 26aecd71818 82020->82021 82022 26aecd6cce0 LdrGetProcedureAddress 82021->82022 82023 26aecd71830 82022->82023 82024 26aecd6cce0 LdrGetProcedureAddress 82023->82024 82025 26aecd71848 82024->82025 82026 26aecd6cce0 LdrGetProcedureAddress 82025->82026 82027 26aecd71860 82026->82027 82028 26aecd6cce0 LdrGetProcedureAddress 82027->82028 82029 26aecd71878 82028->82029 82030 26aecd6cce0 LdrGetProcedureAddress 82029->82030 82031 26aecd71890 82030->82031 82032 26aecd6cce0 LdrGetProcedureAddress 82031->82032 82033 26aecd718a8 82032->82033 82034 26aecd6cce0 LdrGetProcedureAddress 82033->82034 82035 26aecd718c0 82034->82035 82036 26aecd6cce0 LdrGetProcedureAddress 82035->82036 82037 26aecd718d8 82036->82037 82038 26aecd6cce0 LdrGetProcedureAddress 82037->82038 82039 26aecd718f0 82038->82039 82040 26aecd6cce0 LdrGetProcedureAddress 82039->82040 82041 26aecd71908 82040->82041 82042 26aecd6cce0 LdrGetProcedureAddress 82041->82042 82043 26aecd71920 82042->82043 82044 26aecd6cce0 LdrGetProcedureAddress 82043->82044 82045 26aecd71938 82044->82045 82046 26aecd6cce0 LdrGetProcedureAddress 82045->82046 82047 26aecd71950 82046->82047 82048 26aecd6cce0 LdrGetProcedureAddress 82047->82048 82049 26aecd71968 82048->82049 82050 26aecd6cce0 LdrGetProcedureAddress 82049->82050 82051 26aecd71980 82050->82051 82052 26aecd6cce0 LdrGetProcedureAddress 82051->82052 82053 26aecd71998 82052->82053 82054 26aecd6cce0 LdrGetProcedureAddress 82053->82054 82055 26aecd719b0 82054->82055 82056 26aecd6cce0 LdrGetProcedureAddress 82055->82056 82057 26aecd719c8 82056->82057 82058 26aecd6cce0 LdrGetProcedureAddress 82057->82058 82059 26aecd719e0 82058->82059 82060 26aecd6cce0 LdrGetProcedureAddress 82059->82060 82061 26aecd719f8 82060->82061 82062 26aecd6cce0 LdrGetProcedureAddress 82061->82062 82063 26aecd71a10 82062->82063 82064 26aecd6cce0 LdrGetProcedureAddress 82063->82064 82065 26aecd71a28 82064->82065 82066 26aecd6cce0 LdrGetProcedureAddress 82065->82066 82067 26aecd71a40 82066->82067 82068 26aecd6cce0 LdrGetProcedureAddress 82067->82068 82069 26aecd71a58 82068->82069 82070 26aecd6cce0 LdrGetProcedureAddress 82069->82070 82071 26aecd71a70 82070->82071 82072 26aecd6cce0 LdrGetProcedureAddress 82071->82072 82073 26aecd71a88 82072->82073 82074 26aecd6cce0 LdrGetProcedureAddress 82073->82074 82075 26aecd71aa0 82074->82075 82076 26aecd6cce0 LdrGetProcedureAddress 82075->82076 82077 26aecd71ab8 82076->82077 82078 26aecd6cce0 LdrGetProcedureAddress 82077->82078 82079 26aecd71ad0 82078->82079 82080 26aecd6cce0 LdrGetProcedureAddress 82079->82080 82081 26aecd71ae8 82080->82081 82082 26aecd6cce0 LdrGetProcedureAddress 82081->82082 82083 26aecd71b00 82082->82083 82084 26aecd6cce0 LdrGetProcedureAddress 82083->82084 82085 26aecd71b18 82084->82085 82086 26aecd6cce0 LdrGetProcedureAddress 82085->82086 82087 26aecd71b30 82086->82087 82088 26aecd6cce0 LdrGetProcedureAddress 82087->82088 82089 26aecd71b48 82088->82089 82090 26aecd6cce0 LdrGetProcedureAddress 82089->82090 82091 26aecd71b60 82090->82091 82092 26aecd6cce0 LdrGetProcedureAddress 82091->82092 82093 26aecd71b78 82092->82093 82094 26aecd6cce0 LdrGetProcedureAddress 82093->82094 82095 26aecd71b90 82094->82095 82096 26aecd6cce0 LdrGetProcedureAddress 82095->82096 82097 26aecd71bc1 82096->82097 82098 26aecd6cce0 LdrGetProcedureAddress 82097->82098 82099 26aecd71bf2 82098->82099 82100 26aecd6cce0 LdrGetProcedureAddress 82099->82100 82101 26aecd71c23 82100->82101 82102 26aecd6cce0 LdrGetProcedureAddress 82101->82102 82103 26aecd71c54 82102->82103 82104 26aecd6cce0 LdrGetProcedureAddress 82103->82104 82105 26aecd71c85 82104->82105 82106 26aecd6cce0 LdrGetProcedureAddress 82105->82106 82107 26aecd71cb6 82106->82107 82108 26aecd6cce0 LdrGetProcedureAddress 82107->82108 82109 26aecd71ce7 82108->82109 82110 26aecd6cce0 LdrGetProcedureAddress 82109->82110 82111 26aecd71d18 82110->82111 82112 26aecd6cce0 LdrGetProcedureAddress 82111->82112 82113 26aecd71d49 82112->82113 82114 26aecd6cce0 LdrGetProcedureAddress 82113->82114 82115 26aecd71d7a 82114->82115 82116 26aecd6cce0 LdrGetProcedureAddress 82115->82116 82117 26aecd71dab 82116->82117 82118 26aecd6cce0 LdrGetProcedureAddress 82117->82118 82119 26aecd71ddc 82118->82119 82120 26aecd6cce0 LdrGetProcedureAddress 82119->82120 82121 26aecd71e0d 82120->82121 82122 26aecd6cce0 LdrGetProcedureAddress 82121->82122 82123 26aecd71e3e 82122->82123 82124 26aecd6cce0 LdrGetProcedureAddress 82123->82124 82125 26aecd71e6f 82124->82125 82126 26aecd6cce0 LdrGetProcedureAddress 82125->82126 82127 26aecd71ea0 82126->82127 82128 26aecd6cce0 LdrGetProcedureAddress 82127->82128 82129 26aecd71ed1 82128->82129 82130 26aecd6cce0 LdrGetProcedureAddress 82129->82130 82131 26aecd71f02 82130->82131 82132 26aecd6cce0 LdrGetProcedureAddress 82131->82132 82133 26aecd71f33 82132->82133 82134 26aecd6cce0 LdrGetProcedureAddress 82133->82134 82135 26aecd71f64 82134->82135 82136 26aecd6cce0 LdrGetProcedureAddress 82135->82136 82137 26aecd71f95 82136->82137 82138 26aecd6cce0 LdrGetProcedureAddress 82137->82138 82139 26aecd71fc6 82138->82139 82140 26aecd6cce0 LdrGetProcedureAddress 82139->82140 82141 26aecd71ff7 82140->82141 82142 26aecd6cce0 LdrGetProcedureAddress 82141->82142 82143 26aecd72028 82142->82143 82144 26aecd6cce0 LdrGetProcedureAddress 82143->82144 82145 26aecd72059 82144->82145 82146 26aecd6cce0 LdrGetProcedureAddress 82145->82146 82147 26aecd7208a 82146->82147 82148 26aecd6cce0 LdrGetProcedureAddress 82147->82148 82149 26aecd720bb 82148->82149 82150 26aecd6cce0 LdrGetProcedureAddress 82149->82150 82151 26aecd720ec 82150->82151 82152 26aecd6cce0 LdrGetProcedureAddress 82151->82152 82153 26aecd7211d 82152->82153 82154 26aecd6cce0 LdrGetProcedureAddress 82153->82154 82155 26aecd7214e 82154->82155 82156 26aecd6cce0 LdrGetProcedureAddress 82155->82156 82157 26aecd7217f 82156->82157 82158 26aecd6cce0 LdrGetProcedureAddress 82157->82158 82159 26aecd721b0 82158->82159 82160 26aecd6cce0 LdrGetProcedureAddress 82159->82160 82160->81991 82162 26aecd701ce 82161->82162 82163 26aecd6cce0 LdrGetProcedureAddress 82162->82163 82364 26aecd70e4a 82162->82364 82164 26aecd70228 82163->82164 82165 26aecd6cce0 LdrGetProcedureAddress 82164->82165 82166 26aecd70243 82165->82166 82167 26aecd6cce0 LdrGetProcedureAddress 82166->82167 82168 26aecd7026c 82167->82168 82169 26aecd6cce0 LdrGetProcedureAddress 82168->82169 82170 26aecd7028b 82169->82170 82171 26aecd6cce0 LdrGetProcedureAddress 82170->82171 82172 26aecd702aa 82171->82172 82173 26aecd6cce0 LdrGetProcedureAddress 82172->82173 82174 26aecd702c9 82173->82174 82175 26aecd6cce0 LdrGetProcedureAddress 82174->82175 82176 26aecd702e8 82175->82176 82177 26aecd6cce0 LdrGetProcedureAddress 82176->82177 82178 26aecd70307 82177->82178 82179 26aecd6cce0 LdrGetProcedureAddress 82178->82179 82180 26aecd70326 82179->82180 82181 26aecd6cce0 LdrGetProcedureAddress 82180->82181 82182 26aecd70345 82181->82182 82183 26aecd6cce0 LdrGetProcedureAddress 82182->82183 82184 26aecd70364 82183->82184 82185 26aecd6cce0 LdrGetProcedureAddress 82184->82185 82186 26aecd70383 82185->82186 82187 26aecd6cce0 LdrGetProcedureAddress 82186->82187 82188 26aecd703a2 82187->82188 82189 26aecd6cce0 LdrGetProcedureAddress 82188->82189 82190 26aecd703c1 82189->82190 82191 26aecd6cce0 LdrGetProcedureAddress 82190->82191 82192 26aecd703e0 82191->82192 82193 26aecd6cce0 LdrGetProcedureAddress 82192->82193 82194 26aecd703ff 82193->82194 82195 26aecd6cce0 LdrGetProcedureAddress 82194->82195 82196 26aecd7041e 82195->82196 82197 26aecd6cce0 LdrGetProcedureAddress 82196->82197 82198 26aecd7043d 82197->82198 82199 26aecd6cce0 LdrGetProcedureAddress 82198->82199 82200 26aecd7045c 82199->82200 82201 26aecd6cce0 LdrGetProcedureAddress 82200->82201 82202 26aecd7047b 82201->82202 82203 26aecd6cce0 LdrGetProcedureAddress 82202->82203 82204 26aecd7049a 82203->82204 82205 26aecd6cce0 LdrGetProcedureAddress 82204->82205 82206 26aecd704b9 82205->82206 82207 26aecd6cce0 LdrGetProcedureAddress 82206->82207 82208 26aecd704d8 82207->82208 82209 26aecd6cce0 LdrGetProcedureAddress 82208->82209 82210 26aecd704f7 82209->82210 82211 26aecd6cce0 LdrGetProcedureAddress 82210->82211 82212 26aecd70516 82211->82212 82213 26aecd6cce0 LdrGetProcedureAddress 82212->82213 82214 26aecd70535 82213->82214 82215 26aecd6cce0 LdrGetProcedureAddress 82214->82215 82216 26aecd70554 82215->82216 82217 26aecd6cce0 LdrGetProcedureAddress 82216->82217 82218 26aecd70573 82217->82218 82219 26aecd6cce0 LdrGetProcedureAddress 82218->82219 82220 26aecd70592 82219->82220 82221 26aecd6cce0 LdrGetProcedureAddress 82220->82221 82222 26aecd705b1 82221->82222 82223 26aecd6cce0 LdrGetProcedureAddress 82222->82223 82224 26aecd705d0 82223->82224 82225 26aecd6cce0 LdrGetProcedureAddress 82224->82225 82226 26aecd705ef 82225->82226 82227 26aecd6cce0 LdrGetProcedureAddress 82226->82227 82228 26aecd7060e 82227->82228 82229 26aecd6cce0 LdrGetProcedureAddress 82228->82229 82230 26aecd7062d 82229->82230 82231 26aecd6cce0 LdrGetProcedureAddress 82230->82231 82232 26aecd7064c 82231->82232 82233 26aecd6cce0 LdrGetProcedureAddress 82232->82233 82234 26aecd7066b 82233->82234 82235 26aecd6cce0 LdrGetProcedureAddress 82234->82235 82236 26aecd7068a 82235->82236 82237 26aecd6cce0 LdrGetProcedureAddress 82236->82237 82238 26aecd706a9 82237->82238 82239 26aecd6cce0 LdrGetProcedureAddress 82238->82239 82240 26aecd706c8 82239->82240 82241 26aecd6cce0 LdrGetProcedureAddress 82240->82241 82242 26aecd706e7 82241->82242 82243 26aecd6cce0 LdrGetProcedureAddress 82242->82243 82244 26aecd70706 82243->82244 82245 26aecd6cce0 LdrGetProcedureAddress 82244->82245 82246 26aecd70725 82245->82246 82247 26aecd6cce0 LdrGetProcedureAddress 82246->82247 82248 26aecd70744 82247->82248 82249 26aecd6cce0 LdrGetProcedureAddress 82248->82249 82250 26aecd70763 82249->82250 82251 26aecd6cce0 LdrGetProcedureAddress 82250->82251 82252 26aecd70782 82251->82252 82253 26aecd6cce0 LdrGetProcedureAddress 82252->82253 82254 26aecd707a1 82253->82254 82255 26aecd6cce0 LdrGetProcedureAddress 82254->82255 82256 26aecd707c0 82255->82256 82257 26aecd6cce0 LdrGetProcedureAddress 82256->82257 82258 26aecd707df 82257->82258 82259 26aecd6cce0 LdrGetProcedureAddress 82258->82259 82260 26aecd707fe 82259->82260 82261 26aecd6cce0 LdrGetProcedureAddress 82260->82261 82262 26aecd7081d 82261->82262 82263 26aecd6cce0 LdrGetProcedureAddress 82262->82263 82264 26aecd7083c 82263->82264 82265 26aecd6cce0 LdrGetProcedureAddress 82264->82265 82266 26aecd7085b 82265->82266 82267 26aecd6cce0 LdrGetProcedureAddress 82266->82267 82268 26aecd7087a 82267->82268 82269 26aecd6cce0 LdrGetProcedureAddress 82268->82269 82270 26aecd70899 82269->82270 82271 26aecd6cce0 LdrGetProcedureAddress 82270->82271 82272 26aecd708b8 82271->82272 82273 26aecd6cce0 LdrGetProcedureAddress 82272->82273 82274 26aecd708d7 82273->82274 82275 26aecd6cce0 LdrGetProcedureAddress 82274->82275 82276 26aecd708f6 82275->82276 82277 26aecd6cce0 LdrGetProcedureAddress 82276->82277 82278 26aecd70915 82277->82278 82279 26aecd6cce0 LdrGetProcedureAddress 82278->82279 82280 26aecd70934 82279->82280 82281 26aecd6cce0 LdrGetProcedureAddress 82280->82281 82282 26aecd70953 82281->82282 82283 26aecd6cce0 LdrGetProcedureAddress 82282->82283 82284 26aecd70972 82283->82284 82285 26aecd6cce0 LdrGetProcedureAddress 82284->82285 82286 26aecd70991 82285->82286 82287 26aecd6cce0 LdrGetProcedureAddress 82286->82287 82288 26aecd709b0 82287->82288 82289 26aecd6cce0 LdrGetProcedureAddress 82288->82289 82290 26aecd709cf 82289->82290 82291 26aecd6cce0 LdrGetProcedureAddress 82290->82291 82292 26aecd709ee 82291->82292 82293 26aecd6cce0 LdrGetProcedureAddress 82292->82293 82294 26aecd70a0d 82293->82294 82295 26aecd6cce0 LdrGetProcedureAddress 82294->82295 82296 26aecd70a2c 82295->82296 82297 26aecd6cce0 LdrGetProcedureAddress 82296->82297 82298 26aecd70a4b 82297->82298 82299 26aecd6cce0 LdrGetProcedureAddress 82298->82299 82300 26aecd70a6a 82299->82300 82301 26aecd6cce0 LdrGetProcedureAddress 82300->82301 82302 26aecd70a89 82301->82302 82303 26aecd6cce0 LdrGetProcedureAddress 82302->82303 82304 26aecd70aa8 82303->82304 82305 26aecd6cce0 LdrGetProcedureAddress 82304->82305 82306 26aecd70ac7 82305->82306 82307 26aecd6cce0 LdrGetProcedureAddress 82306->82307 82308 26aecd70ae6 82307->82308 82309 26aecd6cce0 LdrGetProcedureAddress 82308->82309 82310 26aecd70b05 82309->82310 82311 26aecd6cce0 LdrGetProcedureAddress 82310->82311 82312 26aecd70b24 82311->82312 82313 26aecd6cce0 LdrGetProcedureAddress 82312->82313 82314 26aecd70b43 82313->82314 82315 26aecd6cce0 LdrGetProcedureAddress 82314->82315 82316 26aecd70b62 82315->82316 82317 26aecd6cce0 LdrGetProcedureAddress 82316->82317 82318 26aecd70b81 82317->82318 82319 26aecd6cce0 LdrGetProcedureAddress 82318->82319 82320 26aecd70ba0 82319->82320 82321 26aecd6cce0 LdrGetProcedureAddress 82320->82321 82322 26aecd70bbf 82321->82322 82323 26aecd6cce0 LdrGetProcedureAddress 82322->82323 82324 26aecd70bde 82323->82324 82325 26aecd6cce0 LdrGetProcedureAddress 82324->82325 82326 26aecd70bfd 82325->82326 82327 26aecd6cce0 LdrGetProcedureAddress 82326->82327 82328 26aecd70c1c 82327->82328 82329 26aecd6cce0 LdrGetProcedureAddress 82328->82329 82330 26aecd70c3b 82329->82330 82331 26aecd6cce0 LdrGetProcedureAddress 82330->82331 82332 26aecd70c5a 82331->82332 82333 26aecd6cce0 LdrGetProcedureAddress 82332->82333 82334 26aecd70c79 82333->82334 82335 26aecd6cce0 LdrGetProcedureAddress 82334->82335 82336 26aecd70c98 82335->82336 82337 26aecd6cce0 LdrGetProcedureAddress 82336->82337 82338 26aecd70cb7 82337->82338 82339 26aecd6cce0 LdrGetProcedureAddress 82338->82339 82340 26aecd70cd6 82339->82340 82341 26aecd6cce0 LdrGetProcedureAddress 82340->82341 82342 26aecd70cf5 82341->82342 82343 26aecd6cce0 LdrGetProcedureAddress 82342->82343 82344 26aecd70d14 82343->82344 82345 26aecd6cce0 LdrGetProcedureAddress 82344->82345 82346 26aecd70d33 82345->82346 82347 26aecd6cce0 LdrGetProcedureAddress 82346->82347 82348 26aecd70d52 82347->82348 82349 26aecd6cce0 LdrGetProcedureAddress 82348->82349 82350 26aecd70d71 82349->82350 82351 26aecd6cce0 LdrGetProcedureAddress 82350->82351 82352 26aecd70d90 82351->82352 82353 26aecd6cce0 LdrGetProcedureAddress 82352->82353 82354 26aecd70daf 82353->82354 82355 26aecd6cce0 LdrGetProcedureAddress 82354->82355 82356 26aecd70dce 82355->82356 82357 26aecd6cce0 LdrGetProcedureAddress 82356->82357 82358 26aecd70ded 82357->82358 82359 26aecd6cce0 LdrGetProcedureAddress 82358->82359 82360 26aecd70e0c 82359->82360 82361 26aecd6cce0 LdrGetProcedureAddress 82360->82361 82362 26aecd70e2b 82361->82362 82363 26aecd6cce0 LdrGetProcedureAddress 82362->82363 82363->82364 82364->81968 82365 26aecd755c0 82372 26aecd75609 82365->82372 82366 26aecd94360 NtCreateThreadEx 82367 26aecd75795 82366->82367 82368 26aecd75eed 82367->82368 82405 26aecd945f0 82367->82405 82423 26aecd78620 RtlFreeHeap 82368->82423 82371 26aecd76177 82372->82366 82372->82368 82373 26aecd757d1 82373->82368 82409 26aecd7f3a0 82373->82409 82376 26aecd94ff0 NtQueueApcThread 82377 26aecd75e84 82376->82377 82377->82368 82378 26aecd94ff0 NtQueueApcThread 82377->82378 82379 26aecd75eb0 82378->82379 82379->82368 82380 26aecd75ec5 82379->82380 82382 26aecd94ff0 NtQueueApcThread 82379->82382 82380->82368 82381 26aecd94ff0 NtQueueApcThread 82380->82381 82383 26aecd75ee9 82381->82383 82384 26aecd75f0e 82382->82384 82383->82368 82385 26aecd94ff0 NtQueueApcThread 82383->82385 82384->82368 82386 26aecd94ff0 NtQueueApcThread 82384->82386 82387 26aecd75f67 82385->82387 82386->82380 82387->82368 82388 26aecd94ff0 NtQueueApcThread 82387->82388 82389 26aecd75f93 82388->82389 82389->82368 82390 26aecd94ff0 NtQueueApcThread 82389->82390 82391 26aecd75fbf 82390->82391 82391->82368 82392 26aecd75fd4 82391->82392 82394 26aecd94ff0 NtQueueApcThread 82391->82394 82392->82368 82393 26aecd94ff0 NtQueueApcThread 82392->82393 82395 26aecd75ff8 82393->82395 82394->82392 82395->82368 82396 26aecd76033 82395->82396 82398 26aecd94ff0 NtQueueApcThread 82395->82398 82396->82368 82397 26aecd94ff0 NtQueueApcThread 82396->82397 82399 26aecd76057 82397->82399 82398->82396 82399->82368 82400 26aecd94ff0 NtQueueApcThread 82399->82400 82401 26aecd760a9 82400->82401 82401->82368 82402 26aecd94ff0 NtQueueApcThread 82401->82402 82403 26aecd760d5 82402->82403 82403->82368 82422 26aecd93a40 NtProtectVirtualMemory 82403->82422 82407 26aecd94621 82405->82407 82406 26aecd94686 82406->82373 82407->82406 82408 26aecd94684 NtDuplicateObject 82407->82408 82408->82406 82410 26aecd7f3bd 82409->82410 82411 26aecd7f3f2 CreateToolhelp32Snapshot 82410->82411 82412 26aecd7f418 Thread32First 82411->82412 82413 26aecd7f610 82411->82413 82412->82413 82420 26aecd7f439 82412->82420 82414 26aecd8b4e0 RtlFreeHeap 82413->82414 82416 26aecd7f61c 82414->82416 82415 26aecd7f5fc Thread32Next 82415->82413 82415->82420 82417 26aecd75871 82416->82417 82418 26aecd8b4e0 RtlFreeHeap 82416->82418 82417->82368 82417->82376 82418->82417 82420->82415 82421 26aecd7f5fa NtResumeThread 82420->82421 82424 26aecd951c0 82420->82424 82421->82415 82422->82368 82423->82371 82426 26aecd951e2 82424->82426 82425 26aecd9523e 82425->82420 82426->82425 82427 26aecd9523c NtReadVirtualMemory 82426->82427 82427->82425 82428 7ffe013f9784 82433 7ffe013f9795 ProcessCodePage 82428->82433 82429 7ffe013f97e6 82436 7ffe013f8230 11 API calls TranslateName 82429->82436 82430 7ffe013f97ca HeapAlloc 82431 7ffe013f97e4 82430->82431 82430->82433 82433->82429 82433->82430 82435 7ffe013f87c8 EnterCriticalSection LeaveCriticalSection ProcessCodePage 82433->82435 82435->82433 82436->82431 82437 7ffe013f1100 82438 7ffe013f1108 82437->82438 82439 7ffe013f1114 __scrt_dllmain_crt_thread_attach 82438->82439 82440 7ffe013f111d 82439->82440 82441 7ffe013f1121 82439->82441 82441->82440 82443 7ffe013f286c 7 API calls 2 library calls 82441->82443 82443->82440 82444 26aecd94be0 82445 26aecd94c02 82444->82445 82446 26aecd94c5e 82445->82446 82447 26aecd94c5c NtProtectVirtualMemory 82445->82447 82447->82446

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 26aecd84d00-26aecd84daf GetUserNameW GetComputerNameExW 1 26aecd84dc7-26aecd84df1 GetComputerNameExW call 26aecd94ad0 0->1 2 26aecd84db1-26aecd84dc1 call 26aecd8b4c0 0->2 7 26aecd84df3-26aecd84e1a GetTokenInformation 1->7 8 26aecd84e58-26aecd84e92 call 26aecd92750 call 26aecd7dfc0 1->8 2->1 9 26aecd84e1c-26aecd84e28 7->9 10 26aecd84e4e-26aecd84e53 call 26aecd94000 7->10 22 26aecd84e94-26aecd84ea5 call 26aecd93de0 8->22 23 26aecd84eaa-26aecd84ed1 GetNativeSystemInfo 8->23 11 26aecd84e2a-26aecd84e39 call 26aecd93de0 9->11 12 26aecd84e3e-26aecd84e49 call 26aecd93de0 9->12 10->8 11->12 12->10 22->23 25 26aecd84ed3-26aecd84ee6 23->25 26 26aecd84ee8-26aecd84eec 23->26 27 26aecd84f01-26aecd84f15 call 26aecd93de0 25->27 28 26aecd84f17-26aecd84f2d call 26aecd93de0 26->28 29 26aecd84eee-26aecd84efd 26->29 33 26aecd84f32-26aecd84f42 27->33 28->33 29->27 35 26aecd84f44-26aecd84f84 call 26aecd93b90 call 26aecd93de0 call 26aecd93b90 * 2 33->35 36 26aecd84f89-26aecd84fb9 GetAdaptersInfo 33->36 35->36 41 26aecd84fbb-26aecd84fdc call 26aecd8b4e0 * 2 36->41 42 26aecd84fdd-26aecd84fe3 36->42 42->41 45 26aecd84fe5-26aecd84ffd call 26aecd8b4c0 GetAdaptersInfo 42->45 45->41 52 26aecd84fff-26aecd8500c 45->52 55 26aecd85012-26aecd85015 52->55 55->41 56 26aecd85017-26aecd85018 55->56 57 26aecd8501f-26aecd85031 call 26aecd693e0 56->57 60 26aecd85033-26aecd85043 call 26aecd93de0 57->60 61 26aecd85045-26aecd8504c 57->61 60->57 61->41 63 26aecd85052-26aecd85062 call 26aecd93de0 61->63 63->55
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: InfoName$AdaptersComputer$InformationNativeSystemTokenUser
                          • String ID:
                          • API String ID: 1596153048-0
                          • Opcode ID: 6bbdf3e9da3f84258629889abaedb5d6ee25559e9894bdc264404470cb3fc362
                          • Instruction ID: dcc7b432627d44a30627c9c1f6fcb50197aa0ee2fab4d46be22894c50c45e7ec
                          • Opcode Fuzzy Hash: 6bbdf3e9da3f84258629889abaedb5d6ee25559e9894bdc264404470cb3fc362
                          • Instruction Fuzzy Hash: 4FA1D835218B048FE756AB18D8A97DAB3D1FB94300F40453DA85BD3291DA7BDA45CF83

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: Thread32$CreateFirstNextSnapshotToolhelp32
                          • String ID: 0
                          • API String ID: 3779972765-4108050209
                          • Opcode ID: 4c371dbba18af4bf193cfc37c22306e9a99c47be7f858c51f084a8ce5b70d07d
                          • Instruction ID: 5b94337f051b8dfd6b47182bf92c079073a8063d9c90705bc7ba5b978820540e
                          • Opcode Fuzzy Hash: 4c371dbba18af4bf193cfc37c22306e9a99c47be7f858c51f084a8ce5b70d07d
                          • Instruction Fuzzy Hash: 33719F34258B488FE7A5EF28C489BAAB7D1FB88304F50097DA55ED3292DB76D4058B43

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: AddressProcedure
                          • String ID:
                          • API String ID: 3653107232-0
                          • Opcode ID: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                          • Instruction ID: e7d77673ffdfbd8efe77a3e57e5c49f7456b9d3567c7b36c9e2e918282fe5768
                          • Opcode Fuzzy Hash: 64a4c363e66e8fcb324c2d013a85a570e217f1f41a485886b1e3891cf8e103dc
                          • Instruction Fuzzy Hash: 8631D475158B188BDA64AB08DC8A7BAB7E4FB85310F50062EE487C3251E632A8458FC7

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 390 26aecd755c0-26aecd75645 call 26aecd783e0 call 26aecd8b4c0 * 3 399 26aecd75657-26aecd7565e 390->399 400 26aecd75647-26aecd75652 call 26aecd78eb0 390->400 402 26aecd756e9-26aecd756f1 399->402 403 26aecd75664-26aecd7566c 399->403 400->399 406 26aecd75716-26aecd75738 call 26aecd94070 402->406 407 26aecd756f3-26aecd75710 402->407 404 26aecd756df 403->404 405 26aecd7566e-26aecd756c0 call 26aecd69ff0 * 6 403->405 404->402 443 26aecd756c7-26aecd756da call 26aecd69ff0 * 2 405->443 444 26aecd756c2 call 26aecd69ff0 405->444 413 26aecd7573e-26aecd75797 call 26aecd94360 406->413 414 26aecd7614a-26aecd7615c call 26aecd94000 406->414 407->406 413->414 421 26aecd7579d-26aecd757d3 call 26aecd945f0 413->421 423 26aecd7616f-26aecd76197 call 26aecd78620 414->423 424 26aecd7615e-26aecd76160 call 26aecd95500 414->424 421->414 434 26aecd757d9-26aecd757ed call 26aecd947d0 421->434 429 26aecd76165-26aecd7616a call 26aecd94000 424->429 429->423 434->414 442 26aecd757f3-26aecd7586c call 26aecd844a0 * 2 call 26aecd781f0 call 26aecd7f3a0 434->442 456 26aecd75871-26aecd7587f 442->456 443->404 444->443 456->414 457 26aecd75885-26aecd7596d 456->457 458 26aecd75a4c-26aecd75a8e 457->458 459 26aecd75973-26aecd75a49 457->459 460 26aecd75a90-26aecd75a91 458->460 461 26aecd75a98-26aecd75aaa 458->461 459->458 460->461 462 26aecd75aac-26aecd75aad 461->462 463 26aecd75ab4-26aecd75ba0 461->463 462->463 464 26aecd75bec-26aecd75c02 463->464 465 26aecd75ba2-26aecd75bea 463->465 466 26aecd75c08-26aecd75c1b 464->466 465->466 467 26aecd75c1d-26aecd75c90 466->467 468 26aecd75c93-26aecd75cd3 466->468 467->468 469 26aecd75cdd-26aecd75d06 468->469 470 26aecd75cd5-26aecd75cd6 468->470 471 26aecd75d71-26aecd75e86 call 26aecd94ff0 469->471 472 26aecd75d08-26aecd75d6e 469->472 470->469 471->414 475 26aecd75e8c-26aecd75eb2 call 26aecd94ff0 471->475 472->471 475->414 478 26aecd75eb8-26aecd75ec3 475->478 479 26aecd75ec5-26aecd75eeb call 26aecd94ff0 478->479 480 26aecd75ef2-26aecd75f10 call 26aecd94ff0 478->480 485 26aecd75eed 479->485 486 26aecd75f43-26aecd75f69 call 26aecd94ff0 479->486 480->414 487 26aecd75f16-26aecd75f3c call 26aecd94ff0 480->487 485->414 486->414 492 26aecd75f6f-26aecd75f95 call 26aecd94ff0 486->492 487->479 493 26aecd75f3e 487->493 492->414 496 26aecd75f9b-26aecd75fc1 call 26aecd94ff0 492->496 493->414 496->414 499 26aecd75fc7-26aecd75fd2 496->499 500 26aecd76001-26aecd7601f call 26aecd94ff0 499->500 501 26aecd75fd4-26aecd75ffa call 26aecd94ff0 499->501 500->501 506 26aecd76021 500->506 507 26aecd75ffc 501->507 508 26aecd76026-26aecd76031 501->508 506->414 507->414 509 26aecd76060-26aecd7607e call 26aecd94ff0 508->509 510 26aecd76033-26aecd76059 call 26aecd94ff0 508->510 509->510 517 26aecd76080 509->517 515 26aecd7605b 510->515 516 26aecd76085-26aecd760ab call 26aecd94ff0 510->516 515->414 516->414 520 26aecd760b1-26aecd760d7 call 26aecd94ff0 516->520 517->414 520->414 523 26aecd760d9-26aecd760e7 call 26aecd93ec0 520->523 523->414 526 26aecd760e9-26aecd76145 call 26aecd62a10 call 26aecd953f0 call 26aecd62a10 call 26aecd93a40 523->526 526->414
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: CreateFirstSnapshotThread32Toolhelp32
                          • String ID:
                          • API String ID: 490256885-0
                          • Opcode ID: a56186ac159eb5f0596d4835abd5748ed37d1b03d675cdace16199ffc87fca4e
                          • Instruction ID: dc8df361902ed0807066bf26b73e9203147e013c8048241739e84e19881327f8
                          • Opcode Fuzzy Hash: a56186ac159eb5f0596d4835abd5748ed37d1b03d675cdace16199ffc87fca4e
                          • Instruction Fuzzy Hash: E1729434118B08CFE7A5DF18D889B95B7E0FB58304F11427ED45ED72A6DB36A846CB82

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 27eee718951805be4d6d661cb21cbd310f36feb23d9644bec408e17137dbdd0c
                          • Instruction ID: dc8f7367151a8f8d0e12463c6e67e7f326ea0ecb319e7d9b701230db0e9529fb
                          • Opcode Fuzzy Hash: 27eee718951805be4d6d661cb21cbd310f36feb23d9644bec408e17137dbdd0c
                          • Instruction Fuzzy Hash: 1841E5741646488FF749DF28D8897AAB3E1FB48314F50066DE46BD32D2CB7A8841CB82

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                          • Instruction ID: b834c325e020b8b5711ce0219a1a38fc691ea3cc76bde05f11ff75cea4c08205
                          • Opcode Fuzzy Hash: 246b04183441d9db0d4c236240df2ca26f18e78107733016fa740d2a375581b5
                          • Instruction Fuzzy Hash: 26414D7555CB888FE7759F08A8467EAB7E0FB89720F00492FD5D983212D776A4428BC3
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
                          • Instruction ID: bc95dd2aed9e987df94a1036f4dbfa7a663a9923b5436b7c6454ae5ba194b896
                          • Opcode Fuzzy Hash: 7425b9f205f2e48f6743ce85b3d4803992b94f2dd7c42288ff67dbf43d2a16d5
                          • Instruction Fuzzy Hash: 9921837465D784CBE755DF0898867EAB7E4FB88721F20092FE849D3351D6769440CB83
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
                          • Instruction ID: dca108ccb84b759701d85652db08203a115f32ae1dd3902e43163655b23dc231
                          • Opcode Fuzzy Hash: c9efb2dc69225788838bd08ce1b571aed7e5ff7df66dff9cf99eed66fee9a7a8
                          • Instruction Fuzzy Hash: 2111E734698B488FEB54DF48988A7AA73E4E788715F40453EE88AC2250E67BD441CF83
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
                          • Instruction ID: 3cb04b76d8c3e748d4ba906dd74b0fd0f3f388ee00b91bea1b675bf352ab85d3
                          • Opcode Fuzzy Hash: 4459b4d784854b5074084b1eb2e58009c50c2c7bf0fd286647bf740f6eacac18
                          • Instruction Fuzzy Hash: 6111B23569CB498FEB559F48988A76973D4E748316F40442EE89AC3291E67B9880CB83
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                          • Instruction ID: dcc01035ea3dcd719955b2706ab6bae364c0dcba39cb193fa5fc5ed656b3ac89
                          • Opcode Fuzzy Hash: 5bb11d53fe8240a521e5f77f5ce288efeffd0a38eebd87c38d9030f26bb6a810
                          • Instruction Fuzzy Hash: 4B11E774158B489FFB669A18D4CA37A73C0F784324F500D2EE99ED21D1DBB755488A43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                          • Instruction ID: 3e3c5eda13c79c6008494507023d5309a3d98480da63cbb8269d141379f5d46a
                          • Opcode Fuzzy Hash: a3b493b046dda1831e3ac93b31f1d57d2ffdedc147415695421c0937c946fff3
                          • Instruction Fuzzy Hash: DF11943465CB45CFEB149F08988BBA977E0F748711F40052EE48AC2290E67B9440CBC3
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                          • Instruction ID: 9f3f7d03afdb024467ab745a60158e2f50b6dcc27002d7f1bd898a357c1e3762
                          • Opcode Fuzzy Hash: c6c2dce99591ed636752d02e92fb4e83679b8b4534c19c070d62bd12e62a70ad
                          • Instruction Fuzzy Hash: 2C010838668B498FEB49BB1894472A533E1F788710F10492EE85AC3651E66BD8408EC3
                          Memory Dump Source
                          • Source File: 00000003.00000003.1707361803.0000026AECD20000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026AECD20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_3_26aecd20000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4f8c2193cd15d56b920b71f0a62798233d7bc621eaf68b72cfb2e802f18a24de
                          • Instruction ID: 1afbca4f42b2bb89753405fe40139d24c2a8506383f8a335964d3991d986fcaa
                          • Opcode Fuzzy Hash: 4f8c2193cd15d56b920b71f0a62798233d7bc621eaf68b72cfb2e802f18a24de
                          • Instruction Fuzzy Hash: 6FF08170618B408BE7449F1884CA63677E1FB98755F24452EE89AD7361CB3298428A43
                          Memory Dump Source
                          • Source File: 00000003.00000003.1707361803.0000026AECD20000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026AECD20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_3_26aecd20000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 744c819c75b2bbda755093bb73dffba834d27d1bf64d68f532f853bd1298e79c
                          • Instruction ID: 738ee851f6fd362299989b86c2d36e28ffba969c431acca23193a31c3fd8abeb
                          • Opcode Fuzzy Hash: 744c819c75b2bbda755093bb73dffba834d27d1bf64d68f532f853bd1298e79c
                          • Instruction Fuzzy Hash: 55F0B474A24F048BD704AF2C888A67573D1F7A8605F54453EA449D7361DB36E4428B43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                          • Instruction ID: 94cc2fe56b6b067afec797afb1053a630f983915be7ba974f615b4dc58019a5b
                          • Opcode Fuzzy Hash: 3a87759f1dbb7da0b31a2215c550786eb7d616866bd4ea5bb0906d9c5e547a0c
                          • Instruction Fuzzy Hash: D0D0A97658DB188EE7209AA8F8873E9B3D0F780328F40483EC18DC2043E67F40468B07

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 67 26aecd67830-26aecd67883 68 26aecd6788a-26aecd67892 InternetOpenW 67->68 69 26aecd67885-26aecd67888 67->69 70 26aecd67898-26aecd678d7 InternetConnectW 68->70 71 26aecd67af9-26aecd67afd 68->71 69->68 70->71 72 26aecd678dd-26aecd6792b HttpOpenRequestW 70->72 73 26aecd67aff-26aecd67b0c 71->73 72->73 74 26aecd67931-26aecd6793b 72->74 75 26aecd67b0e-26aecd67b11 InternetCloseHandle 73->75 76 26aecd67b17-26aecd67b1a 73->76 77 26aecd67990-26aecd679ab 74->77 78 26aecd6793d-26aecd67945 74->78 75->76 79 26aecd67b1c-26aecd67b1d 76->79 80 26aecd67b25-26aecd67b28 76->80 77->73 90 26aecd679b1-26aecd679ba 77->90 78->77 81 26aecd67947-26aecd6798b call 26aecd92750 * 2 78->81 79->80 82 26aecd67b2a-26aecd67b2b 80->82 83 26aecd67b33-26aecd67b3b 80->83 81->77 82->83 84 26aecd67bd0-26aecd67be3 83->84 85 26aecd67b41-26aecd67b4b 83->85 88 26aecd67b4d-26aecd67b54 call 26aecd91230 85->88 89 26aecd67b62-26aecd67b73 85->89 88->89 101 26aecd67b56-26aecd67b60 call 26aecd8b4e0 88->101 95 26aecd67b7a-26aecd67b8a call 26aecd6cb60 89->95 96 26aecd67b75-26aecd67b78 89->96 93 26aecd679bc-26aecd679de call 26aecd91270 HttpSendRequestA 90->93 94 26aecd679e6-26aecd67a0a 90->94 93->73 107 26aecd679e4-26aecd67a16 93->107 110 26aecd67a0c 94->110 108 26aecd67b8c-26aecd67bb8 call 26aecd6a050 call 26aecd8b4e0 95->108 109 26aecd67bba-26aecd67bce call 26aecd91410 95->109 96->84 96->95 101->84 118 26aecd67a18-26aecd67a1f call 26aecd8b4e0 107->118 119 26aecd67a24-26aecd67a3b call 26aecd8b4c0 107->119 108->84 109->84 109->101 110->93 118->119 125 26aecd67a3f-26aecd67a5b 119->125 127 26aecd67a61-26aecd67a69 125->127 128 26aecd67ae3-26aecd67af7 call 26aecd8b4e0 125->128 127->128 130 26aecd67a6b-26aecd67a7e 127->130 128->75 130->128 133 26aecd67a80-26aecd67a86 130->133 133->128 134 26aecd67a88-26aecd67a96 133->134 135 26aecd67aac-26aecd67aaf call 26aecd8b4c0 134->135 136 26aecd67a98-26aecd67aaa 134->136 138 26aecd67ab4-26aecd67ade call 26aecd844a0 135->138 136->138 138->125
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: Internet$HttpOpenRequest$CloseConnectFreeHandleHeapSend
                          • String ID:
                          • API String ID: 3224957877-0
                          • Opcode ID: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
                          • Instruction ID: 4436b6be1184e561bc14fd7993693352cb4f042c7229c43b85ce61259e6ef513
                          • Opcode Fuzzy Hash: d9666d6ee9cc84210a5d48bfb43a1b93f204f5f1cab97c350c418fdf5ba67fc7
                          • Instruction Fuzzy Hash: EDB1A234218A088BEB55EB28D8997AAB3D5FB98310F05057DA85BD3291DF77D841CB83

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: Fiber$CreateDelete
                          • String ID:
                          • API String ID: 2527733159-0
                          • Opcode ID: a81c3d8a98be896dd9ba18f06cc8f029549e5d5c5a40f868ab439c78b2d98936
                          • Instruction ID: 86911c4c4923aab338f99f3b6fc3625f7c4f7dcc5fc374748b538de5b3e0d9d6
                          • Opcode Fuzzy Hash: a81c3d8a98be896dd9ba18f06cc8f029549e5d5c5a40f868ab439c78b2d98936
                          • Instruction Fuzzy Hash: 6E51EB35658A148FEB69AB289C8976573D1F758311F200339E8ABE31D1DB379C528BC2

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: CreateMutex
                          • String ID:
                          • API String ID: 1964310414-0
                          • Opcode ID: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                          • Instruction ID: 93d5468c674251dc370b599cc521d3c8910de7035b7a934f2d3de85f49d56c75
                          • Opcode Fuzzy Hash: 6f5cb151aadba70b4aa6e5bafaf7101ce807ceecab62b3beafb4f2b699b4b3ec
                          • Instruction Fuzzy Hash: E7E12475408A0D8FE751EF18E895BE6B7F4F768340F10067BE84AC2261EB799245CB86

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 338 26aecd8b4e0-26aecd8b4ee 339 26aecd8b523-26aecd8b52f 338->339 340 26aecd8b4f0-26aecd8b505 338->340 340->339 342 26aecd8b507-26aecd8b51d call 26aecd84ce0 RtlFreeHeap 340->342 342->339
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: FreeHeap
                          • String ID:
                          • API String ID: 3298025750-0
                          • Opcode ID: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                          • Instruction ID: 98dade8dd29ecd21dff9bfc8c440e3a52cac48bedf3c323b4ef7cbf917e0b1d1
                          • Opcode Fuzzy Hash: d9c8acccb119fdf6d5691a0567f94fa179966e421fbccb122f962e3160943c6c
                          • Instruction Fuzzy Hash: 92F01C34350A088BFB59E7BAACD876537E6FB9C341B4480A4A416C6194EB3A9941CB02

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Concurrency::cancel_current_taskstd::bad_alloc::bad_alloc
                          • String ID:
                          • API String ID: 680105476-0
                          • Opcode ID: d8ba32d3aeddf103bc5a018b16ca6ac48feccc558b7e427f7e9957ee7a58d25b
                          • Instruction ID: c9d24e537df0f93005da9412f1592366245fc7357fbfe49f3b9ca10157feb3ba
                          • Opcode Fuzzy Hash: d8ba32d3aeddf103bc5a018b16ca6ac48feccc558b7e427f7e9957ee7a58d25b
                          • Instruction Fuzzy Hash: A7E0EC80E5D1CB45FF1C356A18160B540424F65771E1A1B3CF97E2D2F3AD1CE4558150

                          Control-flow Graph

                          APIs
                          • __scrt_dllmain_crt_thread_attach.LIBCMT ref: 00007FFE013F1114
                            • Part of subcall function 00007FFE013F286C: __vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00007FFE013F2874
                            • Part of subcall function 00007FFE013F286C: __vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00007FFE013F2879
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: __scrt_dllmain_crt_thread_attach__vcrt_uninitialize_locks__vcrt_uninitialize_ptd
                          • String ID:
                          • API String ID: 1208906642-0
                          • Opcode ID: e1844762edc638c08c617c9bf97e15cfdb26e133e3ab7bcaa5fe0919b20a78e9
                          • Instruction ID: 2f24fbc33ab71c2f00123accdfe83ea167afe9abf34526fcc00fe6ea11dae857
                          • Opcode Fuzzy Hash: e1844762edc638c08c617c9bf97e15cfdb26e133e3ab7bcaa5fe0919b20a78e9
                          • Instruction Fuzzy Hash: A9E0E250E1D2C3C1FFA8366569422F94B440F21344F82147CE85D7E1F39E4E74461A62

                          Control-flow Graph

                          APIs
                          • HeapAlloc.KERNEL32(?,?,00000000,00007FFE013FA7BA,?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013F97D9
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: AllocHeap
                          • String ID:
                          • API String ID: 4292702814-0
                          • Opcode ID: e2d5b7430ce25b2c9267f187cacd0046a4a12b3df5020a07f7f07231c417547b
                          • Instruction ID: fc507c4ee77eccf6e14f1aa6b42350d6b4370644bbc3d7217b62c89483a7a27f
                          • Opcode Fuzzy Hash: e2d5b7430ce25b2c9267f187cacd0046a4a12b3df5020a07f7f07231c417547b
                          • Instruction Fuzzy Hash: 6EF09044F0978345FF587FA299503B512945F84B88F5E0038DC0EAE3F2ED2CE5888320
                          Memory Dump Source
                          • Source File: 00000003.00000003.1707361803.0000026AECD20000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026AECD20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_3_26aecd20000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6258ad962565a3180bb006997aefc3c2d41d9dd5a2811c72a17a211375779bb6
                          • Instruction ID: c7e8afc9b02e52757cf8ad5f25fc053daec61c619fca8b020839a2a500230b4e
                          • Opcode Fuzzy Hash: 6258ad962565a3180bb006997aefc3c2d41d9dd5a2811c72a17a211375779bb6
                          • Instruction Fuzzy Hash: 5A017D3864995ACBE79AF76868C476276C1F7DC340F544075D81AC32C9C92FC8424751
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: UNIQUE$BINARY$CREATE%s INDEX %.*s$FIRST$INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);$LAST$cannot create a TEMP index on non-TEMP table "%s"$conflicting ON CONFLICT clauses specified$expressions prohibited in PRIMARY KEY and UNIQUE constraints$index$index %s already exists$invalid rootpage$name='%q' AND type='index'$sqlite_$sqlite_autoindex_%s_%d$sqlite_master$sqlite_temp_master$table %s may not be indexed$there is already a table named %s$too many columns in %s$unsupported use of NULLS %s$views may not be indexed$virtual tables may not be indexed
                          • API String ID: 0-2483461966
                          • Opcode ID: d7c0c18ccbea3f5780cd58bdf531708999542d4204fc7ca0f47c626bc0992c34
                          • Instruction ID: f9afc8b60130bce7158dffd250d471d9d34a0928bc4448562b5d3c61a9a6fbe6
                          • Opcode Fuzzy Hash: d7c0c18ccbea3f5780cd58bdf531708999542d4204fc7ca0f47c626bc0992c34
                          • Instruction Fuzzy Hash: 7FC2CC62B08B9285EB608B15D4446BDBBA5FB45BC4F468136DE8D8B7B9DF3CE441CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: missing from index $ values differ from index $*** in database %s ***$BINARY$CHECK constraint failed in %s$NULL value in %s.%s$NUMERIC value in %s.%s$TEXT value in %s.%s$database disk image is malformed$non-%s value in %s.%s$non-unique entry in index $q$row $row not in PRIMARY KEY order for %s$wrong # of entries in index
                          • API String ID: 0-2842236643
                          • Opcode ID: 8b0ce0ab506f2e8606d43e5365e028eb3fedbddf92bc12b9280e71352f5b2aa9
                          • Instruction ID: bc00b802a97c5e421769fdb61236280c3e9075c647167f9419fc561ec7e7cbbc
                          • Opcode Fuzzy Hash: 8b0ce0ab506f2e8606d43e5365e028eb3fedbddf92bc12b9280e71352f5b2aa9
                          • Instruction Fuzzy Hash: FA137D72A08B818AEB20DF15D4447AD7BA1FB84F98F568236DA4E5BBA4DF3DD441C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: AUTOINCREMENT not allowed on WITHOUT ROWID tables$CREATE %s %.*s$CREATE TABLE %Q.sqlite_sequence(name,seq)$PRIMARY KEY missing on table %s$TABLE$UPDATE %Q.sqlite_master SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d$VIEW$missing datatype for %s.%s$must have at least one non-generated column$sqlite_sequence$table$tbl_name='%q' AND type!='trigger'$unknown datatype for %s.%s: "%s"$view
                          • API String ID: 0-2402647485
                          • Opcode ID: fa64730fd2762ed6dba9d95a655f1bce0a9b6b574417d3228855b4aebedf1199
                          • Instruction ID: 22a965d9ac57df616d3edb2a1d7bb737912e599fdf2559c5e8225fd243e94a0e
                          • Opcode Fuzzy Hash: fa64730fd2762ed6dba9d95a655f1bce0a9b6b574417d3228855b4aebedf1199
                          • Instruction Fuzzy Hash: E5528E72A0878286EB649F25E4407B97BA0FB48BC8F069175DA8E4B7A5DF3CE545C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: USING COVERING INDEX $CO-ROUTINE %!S$DISTINCT$GROUP BY$MATERIALIZE %!S$SCAN %s%s%s$USE TEMP B-TREE FOR %s$expected %d columns for '%s' but got %d$max$min$target object/alias may not appear in FROM clause: %s
                          • API String ID: 0-1030564652
                          • Opcode ID: b202d8f1604caf37fa9b79c5c216c4e7bd9aaac1d539025cac5c7be896275b32
                          • Instruction ID: aafbcb23f9d834b1a584ed159f12774e92d760a2e4d8475e055546c4483727d7
                          • Opcode Fuzzy Hash: b202d8f1604caf37fa9b79c5c216c4e7bd9aaac1d539025cac5c7be896275b32
                          • Instruction Fuzzy Hash: B1538073A09A818AEB54CF25D080BAD7BA4FB84B84F928136DB4D4B7A5DF3DD451CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %!S$%s.%s$%s.%s.%s$'%s' is not a function$..%s$Expression tree is too large (maximum depth %d)$access to view "%s" prohibited$no such table: %s$no tables specified$too many columns in result set$too many references to "%s": max 65535$unsafe use of virtual table "%s"
                          • API String ID: 0-3486433936
                          • Opcode ID: 1da39b2d3640856c719886071d137ac9fc7873f92111d025289bbc8ce5571c6e
                          • Instruction ID: 46c3ccda07f816b674432884881e38017f5c944276aac1a7c970de9de953f302
                          • Opcode Fuzzy Hash: 1da39b2d3640856c719886071d137ac9fc7873f92111d025289bbc8ce5571c6e
                          • Instruction Fuzzy Hash: 1AC2CF62A08B8286EB65CF15D4803BA77A0FB44B94F869235DF9D0B7A5DF3DE490C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$API call with %s database connection pointer$BINARY$NOCASE$RTRIM$automatic extension loading failed: %s$invalid$main$misuse$temp$v
                          • API String ID: 0-3707469561
                          • Opcode ID: 1cce1f10229e4fddfb2db882d5f02692312283c700ff9b81b6cd8583de597cc6
                          • Instruction ID: 9054fdb1d69a1b6f9a843287377e6affdfa00e10630c7844dfe67d0823d174ba
                          • Opcode Fuzzy Hash: 1cce1f10229e4fddfb2db882d5f02692312283c700ff9b81b6cd8583de597cc6
                          • Instruction Fuzzy Hash: D6427AA2E0DB8685EB658F2AE85027937A1FB84F84F954136DA4E4B7B4CF3CE445C344
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Child page depth differs$Extends off end of page$Fragmentation of %d bytes reported as %d on page %u$Multiple uses for byte %u of page %u$Offset %d out of range %d..%d$On page %u at right child: $On tree page %u cell %d: $Page %u: $Rowid %lld out of order$btreeInitPage() returns error code %d$free space corruption$unable to get the page. error code=%d
                          • API String ID: 0-934750177
                          • Opcode ID: e7bd4d9c7646848d33e68cd7fef50520113914b1b2705274c3fc1ad2220088b3
                          • Instruction ID: 308c7ac720f42f7bb63ca97f1773f42597ae97d87e3b84918cc916ec73b400a2
                          • Opcode Fuzzy Hash: e7bd4d9c7646848d33e68cd7fef50520113914b1b2705274c3fc1ad2220088b3
                          • Instruction Fuzzy Hash: 5422DF76A096918BD764CF29E00067EBBA0F785B84F059135EF8A4BB68DF3DE455CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s mode not allowed: %s$access$cach$cach$cache$file$invalid uri authority: %.*s$localhos$mode$mode$no such %s mode: %s$no such vfs: %s
                          • API String ID: 0-1067337024
                          • Opcode ID: 99a78c5a55c126cc88e460cda838c4a2039a9417c8cdd440bb7dd26b4a88603e
                          • Instruction ID: 3ddb7e0e5df6471b4826b9154851c154af3bbb5a4258497e688aed0cf0c3db5f
                          • Opcode Fuzzy Hash: 99a78c5a55c126cc88e460cda838c4a2039a9417c8cdd440bb7dd26b4a88603e
                          • Instruction Fuzzy Hash: B80236E2E0C28669FF758B1584163792BD1EB51F54F168235CA9E4F2F1CE7DE6828308
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: always$aolf$bolb$bolc$buod$duplicate column name: %s$generated$laer$rahc$too many columns on %s$txet
                          • API String ID: 0-2711416707
                          • Opcode ID: f2edbba5a3046b78e4b4417d45e1888326175b152c936902df131ca6e4ca4370
                          • Instruction ID: 0b93c55b62a81a6b5e4ef250b8a77b4b07747bb23ef3515d4b003650cc91e7c7
                          • Opcode Fuzzy Hash: f2edbba5a3046b78e4b4417d45e1888326175b152c936902df131ca6e4ca4370
                          • Instruction Fuzzy Hash: 783249A2A0CAD385EB658B2594523BD7BE1FB41BC4F56C136DA9E4B2B1CE2CE541C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                          • String ID: utf8
                          • API String ID: 3069159798-905460609
                          • Opcode ID: 5487e5a400001d4f56018c9c310e9b95909492dba264b8e7cd6f344830101e2f
                          • Instruction ID: 4cc7baccb679611dbbfc3a1caa0198c7d1975f3ea36e37bf651f21334ad2bbbc
                          • Opcode Fuzzy Hash: 5487e5a400001d4f56018c9c310e9b95909492dba264b8e7cd6f344830101e2f
                          • Instruction Fuzzy Hash: FD91CF32A0878282EB26AFA2D4146B933A4EF84B80F454139DE4D5B7F5DFBDE955C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                          • String ID:
                          • API String ID: 2591520935-0
                          • Opcode ID: 076d886bfa2acd654b465ba083faac6f3c9cc38e7c0957c6ce594343932ecb80
                          • Instruction ID: 417442589e3466e17b5656495ac88b59c869952ce68cbff5667203c2a4abf695
                          • Opcode Fuzzy Hash: 076d886bfa2acd654b465ba083faac6f3c9cc38e7c0957c6ce594343932ecb80
                          • Instruction Fuzzy Hash: EA716D22F1865289FB529BA2D858ABC23A0BF48758F44443DCE1D5B6F5DF7CAC45C350
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$API call with %s database connection pointer$API called with finalized prepared statement$NULL$invalid$misuse$unopened
                          • API String ID: 0-2588185155
                          • Opcode ID: 2fd9805eb42e1f6ef22a2f79b6ecac734beb7452c482b6757f9efba3e5c02a25
                          • Instruction ID: 78e00a17744653a34efbe4802f046ade7cd658b50745bb00d691433187ebc79f
                          • Opcode Fuzzy Hash: 2fd9805eb42e1f6ef22a2f79b6ecac734beb7452c482b6757f9efba3e5c02a25
                          • Instruction Fuzzy Hash: CC42BAA2A09A8281FB659F15D4443BA73A5FF84F84F564232DA5E4F3B5EF3CE8418344
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                          • String ID:
                          • API String ID: 3140674995-0
                          • Opcode ID: 55f9487a3a37d419e32935d06c83ee3204da43ce5e5de20929af22de147d5fc1
                          • Instruction ID: 665429a5c7c109ca24c6924b54e462d3edcb22cd504174831c84c49adc9204af
                          • Opcode Fuzzy Hash: 55f9487a3a37d419e32935d06c83ee3204da43ce5e5de20929af22de147d5fc1
                          • Instruction Fuzzy Hash: 05315E76A09B81CAEB609FA1E8407EE7364FB84744F44443ADA4E5BBA4DF3CD548C710
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %d values for %d columns$UPSERT not implemented for virtual table "%s"$cannot INSERT into generated column "%s"$cannot UPSERT a view$rows inserted$table %S has %d columns but %d values were supplied$table %S has no column named %s
                          • API String ID: 0-3663672232
                          • Opcode ID: 11d4e5e0a5b9128f3ee1de285a23c5adc91e58bd92c5378f8b9b173659030bb9
                          • Instruction ID: 277989e16a162439585a9a6c9d183371dd0ab0c3aa2f5af5482de1ca9b08681b
                          • Opcode Fuzzy Hash: 11d4e5e0a5b9128f3ee1de285a23c5adc91e58bd92c5378f8b9b173659030bb9
                          • Instruction Fuzzy Hash: C5F27E72A096918AEB60CF25C4857AD3BA5FB84B88F524136DF4D4B7A6EF3CE441C740
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)$Failed to read ptrmap key=%d$Main freelist: $Page %d is never used$Pointer map page %d is referenced$incremental_vacuum enabled with a max rootpage of zero$max rootpage (%d) disagrees with header (%d)
                          • API String ID: 0-2103957143
                          • Opcode ID: c9613edc4a1164fa6205d489438b2c7308cfcab2ed5c76fbf947250ec92436bd
                          • Instruction ID: cfcba2ae1bf4c7002920c659a9033ccb109c63d1fb74f3590969fdad64894490
                          • Opcode Fuzzy Hash: c9613edc4a1164fa6205d489438b2c7308cfcab2ed5c76fbf947250ec92436bd
                          • Instruction Fuzzy Hash: 83125B72A08A828BEB65CFA9E44027D7BA1FB94758F554139DA4D4BBB4DF3CF4418B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: AddressProc$LibraryLoad
                          • String ID:
                          • API String ID: 2238633743-0
                          • Opcode ID: 1afc37d47e21fe4db280e3a57abc0f00bd42785e735c5657d2df56b21c99e1b5
                          • Instruction ID: f48893de7fc3fadca82e975de74bb396dc034bbb3061ad697ee113f7b6c354fc
                          • Opcode Fuzzy Hash: 1afc37d47e21fe4db280e3a57abc0f00bd42785e735c5657d2df56b21c99e1b5
                          • Instruction Fuzzy Hash: 45416462A09B8686EF1ADF66D55023937A1FB44F84F098036DE4E2B775DF3CE8518300
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                          • String ID:
                          • API String ID: 1239891234-0
                          • Opcode ID: 317b68d8b54ebd0cb2e48c5d5fcba97bb08197c4a9347119987f5a04022b063a
                          • Instruction ID: 0ffd4e665a8643e7385d12254adce74ac14b79314deaf5f20240fbd8ab1b915e
                          • Opcode Fuzzy Hash: 317b68d8b54ebd0cb2e48c5d5fcba97bb08197c4a9347119987f5a04022b063a
                          • Instruction Fuzzy Hash: 7931A272608F8186DB60DF65E8402AE73A4FB88754F500239EA9D4BB78DF3CD559CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: BINARY$E$Expression tree is too large (maximum depth %d)$NOCASE$ON clause references tables to its right$false
                          • API String ID: 0-120726598
                          • Opcode ID: ae553a65a4b773e1da32f7d4cedd146e51785b28b25b7cd3397d7335796026c6
                          • Instruction ID: 9dfc08c64589bbfcadce3d45c3d53a7d031d39a843b2c9f7fe28e305e246560d
                          • Opcode Fuzzy Hash: ae553a65a4b773e1da32f7d4cedd146e51785b28b25b7cd3397d7335796026c6
                          • Instruction Fuzzy Hash: 6CE2CE62A0D78286EB64CB2691447797BE1FB64B88F069136DE4D4B7E9DF3CE841C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Expression tree is too large (maximum depth %d)$a NATURAL join may not have an ON or USING clause$ambiguous reference to %s in USING()$cannot join using column %s - column not present in both tables$coalesce$too many arguments on function %T
                          • API String ID: 0-1975222901
                          • Opcode ID: 9a88fc45b173f08caf0adfc662823e2b4925ef482a29bbba591bcabe0683e6f2
                          • Instruction ID: b9c06854584549c8897e58991abef0999dc9fc69a336ebca4e71971d3a13abf5
                          • Opcode Fuzzy Hash: 9a88fc45b173f08caf0adfc662823e2b4925ef482a29bbba591bcabe0683e6f2
                          • Instruction Fuzzy Hash: 8E72D162A08AC186EB64CF55E5417BA7BA0FB84BC4F469136DE8E4B7A5DF3CE441C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: main$schema$sqlite_$sqlite_master$sqlite_temp_master$temp_schema
                          • API String ID: 0-3006123741
                          • Opcode ID: 2f16469c78149c198eec2911a83ca5f7d968b4ca7d428e3531c44a61c104cc94
                          • Instruction ID: 6b3d1dcb900eac40e290848d592eca6602b42674f2afc595cb18b1e2b8681570
                          • Opcode Fuzzy Hash: 2f16469c78149c198eec2911a83ca5f7d968b4ca7d428e3531c44a61c104cc94
                          • Instruction Fuzzy Hash: 54120562E0C9D740EB954F2680606BC3FA1FF51BC5B66913AEE9E4B3B1CE2CD9459700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s USING TEMP B-TREE$COMPOUND QUERY$LEFT-MOST SUBQUERY$SCAN %d CONSTANT ROW%s$UNION ALL
                          • API String ID: 0-146987844
                          • Opcode ID: 1454b05ddc824b0828ba6a6e2abbfe483e0d8b1592d0cf516529dfca885931f2
                          • Instruction ID: 0afcf8e0ba31193ba089a2b7bfde5465adf35152db028b3c8569ad48802b8375
                          • Opcode Fuzzy Hash: 1454b05ddc824b0828ba6a6e2abbfe483e0d8b1592d0cf516529dfca885931f2
                          • Instruction Fuzzy Hash: 0092BD72A096428AEB64DF26D044BBE37A5FB45B88F868135DE4D4BBA5DF3DE401C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: first_value$lag$lead$nth_value
                          • API String ID: 0-1849363824
                          • Opcode ID: 6abb138c9164899ef69d689318b61399e20871f2d70698f3ec524ba9009ae6c5
                          • Instruction ID: 80824b06be70d7f2abc2b791fb1c20cd43ec44725a6972bb4b0396593db765cc
                          • Opcode Fuzzy Hash: 6abb138c9164899ef69d689318b61399e20871f2d70698f3ec524ba9009ae6c5
                          • Instruction Fuzzy Hash: 34E28272A14A51CAEB10DF25D090BAD3BA1F784F88F558236DB4E4BB69EB3DD405CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: BINARY$Expression tree is too large (maximum depth %d)$auto-index$automatic index on %s(%s)
                          • API String ID: 0-3626234020
                          • Opcode ID: fda548d4cca40faa64e7c04495c2c94fc43deb2edc5870fda484c6531ce11dbc
                          • Instruction ID: abbcbde4af71660de22151c754dff7810de28aa172e8a01f157eb11299702b8e
                          • Opcode Fuzzy Hash: fda548d4cca40faa64e7c04495c2c94fc43deb2edc5870fda484c6531ce11dbc
                          • Instruction Fuzzy Hash: 1FB29072A08B8186EB64DF25E4907AD7BA4FB84B84F528135DB8D4B7A5DF3CE451CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: RECURSIVE STEP$SETUP$cannot use window functions in recursive queries$recursive aggregate queries not supported
                          • API String ID: 0-4261064685
                          • Opcode ID: da3e82339614fec6f260c50b8955e63aaafa2301857181e9cd07d2b6493b7a94
                          • Instruction ID: b112ae0f3bb6a36ba4e257b69c32a49397605d52c86ae45fc3289e399c9c183f
                          • Opcode Fuzzy Hash: da3e82339614fec6f260c50b8955e63aaafa2301857181e9cd07d2b6493b7a94
                          • Instruction Fuzzy Hash: BC529F72608A818BEB64DF25D140BADBBA5F784B84F928135CB8E4B765DF3DE451CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: first_value$lag$lead$nth_value
                          • API String ID: 0-1849363824
                          • Opcode ID: 805723ddc7bed7cf74a5d81985b72a0d60ff043f44d1ed47fe2fe52334a389c0
                          • Instruction ID: daf4ce9af57bd216fa612ab7f9eb60fc00b8540c19c47d06639983cc6b02770c
                          • Opcode Fuzzy Hash: 805723ddc7bed7cf74a5d81985b72a0d60ff043f44d1ed47fe2fe52334a389c0
                          • Instruction Fuzzy Hash: 4D428E72619A81CADB10DF15D490BAD3BA0F784F88F568236CB8E8B769DB3DD511CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %sSCALAR SUBQUERY %d$CORRELATED $Expression tree is too large (maximum depth %d)$REUSE SUBQUERY %d
                          • API String ID: 0-875495356
                          • Opcode ID: 2500a914490ec4f54c6c1694bd0fb91ec3549e782ef5adef13b7e95241b025cc
                          • Instruction ID: c3480a26e4e52a1ce08b4084706b275ee335039900718af82243b75bde391025
                          • Opcode Fuzzy Hash: 2500a914490ec4f54c6c1694bd0fb91ec3549e782ef5adef13b7e95241b025cc
                          • Instruction Fuzzy Hash: 91F19C72A087818AE760CF25D4807A97BA5FB84B84F569235DF8D4B765DF3CE451CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$database corruption
                          • API String ID: 0-155238906
                          • Opcode ID: cb6595698c4938a6bb728b6c014e91e86e889e1afb8d787a44370e5b7b0fcd67
                          • Instruction ID: 7d86556a1700eeb0766c123126fdbfad6115ab1dd80a072016f75f98a29a533e
                          • Opcode Fuzzy Hash: cb6595698c4938a6bb728b6c014e91e86e889e1afb8d787a44370e5b7b0fcd67
                          • Instruction Fuzzy Hash: 09E27B76A08A918AEB50CF65E4406AE7BB1F748B88F114135EF8D5BB68DF3CE445CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: $SCAN CONSTANT ROW$at most %d tables in a join
                          • API String ID: 0-717196896
                          • Opcode ID: 762dd9e840892b7ddc29a3942fe6d94a378c9fb91c98f9795c1e99f7d2808c66
                          • Instruction ID: c290cdba30d76ecc3aa855c556e39c1e82a248fc714c42682e82193aa06f012c
                          • Opcode Fuzzy Hash: 762dd9e840892b7ddc29a3942fe6d94a378c9fb91c98f9795c1e99f7d2808c66
                          • Instruction Fuzzy Hash: 21C27A76A08B818AEB64CF15D0447A97BE4FB98B88F064135DB8E4B7A9DF3CE451C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: BBB$p$sqlite\_%
                          • API String ID: 0-2988038722
                          • Opcode ID: 5816150149daf270d209d04d605996feb6a5589464549f64c077c5ca631b2801
                          • Instruction ID: 5682b6283e603d3fcb470e92ba5e2704a80141ab74b1442221e8a377fab199a9
                          • Opcode Fuzzy Hash: 5816150149daf270d209d04d605996feb6a5589464549f64c077c5ca631b2801
                          • Instruction Fuzzy Hash: D3B25D72618B818ADB60DF15D040BAD7BA4F788F88F568236DA8E4B769DF3DD445CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$database corruption
                          • API String ID: 0-155238906
                          • Opcode ID: 924ef14f8cb07c0a68abc310fa40045ed465ec91da555ce68851ab87387703ce
                          • Instruction ID: 10e2f8c4ff7ccf5103761298d331ffb399a1c3aea7e3c7b93c2c1036464884ff
                          • Opcode Fuzzy Hash: 924ef14f8cb07c0a68abc310fa40045ed465ec91da555ce68851ab87387703ce
                          • Instruction Fuzzy Hash: 218269B2A0978287EB648F25D0842B977A1FB49B84F164135DA4D4B7B1DF3DF896C700
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(?,?,?,00007FFE013F066D,?,?,?,?,?,?,00007FFE0140491E,?,00000000,?,00000000,00000000), ref: 00007FFE013F0573
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00007FFE013F066D,?,?,?,?,?,?,00007FFE0140491E,?,00000000,?,00000000,00000000), ref: 00007FFE013F057C
                          • GetCurrentProcess.KERNEL32(?,?,?,00007FFE013F066D,?,?,?,?,?,?,00007FFE0140491E,?,00000000,?,00000000,00000000), ref: 00007FFE013F0582
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CurrentProcess
                          • String ID:
                          • API String ID: 1249254920-0
                          • Opcode ID: e894c875aad3164a7e7f05ed7a9ae4fa21b59bd118822bcd2b43b8446e047bc0
                          • Instruction ID: d3ee1dfbd5f292817a4ab92f6cbde8e8875752c6ebe410878a9ce2b0c8d0ce8d
                          • Opcode Fuzzy Hash: e894c875aad3164a7e7f05ed7a9ae4fa21b59bd118822bcd2b43b8446e047bc0
                          • Instruction Fuzzy Hash: 6AD092A1E18A0B8AEB1A5BB3A9150362220AF5DB41B091038CA4A4E330AD3C9C9A8300
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: USING INDEX %s FOR IN-OPERATOR$USING ROWID SEARCH ON TABLE %s FOR IN-OPERATOR$p
                          • API String ID: 0-3341458115
                          • Opcode ID: 8e5e7d1d6f7fe6d0542a773a9cce19f009fcb8df88c3b48351c823b9d408ba94
                          • Instruction ID: b8eef15f20abdd0915e35c4ba46d5d05683a46a4a960db96a8660b3f24298209
                          • Opcode Fuzzy Hash: 8e5e7d1d6f7fe6d0542a773a9cce19f009fcb8df88c3b48351c823b9d408ba94
                          • Instruction Fuzzy Hash: E952A072A09A96C6EB608B15D0407BA7BA1FB84FC4F468136DE4E5B7A5DF3CE841C740
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: $0$@
                          • API String ID: 0-2347541974
                          • Opcode ID: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
                          • Instruction ID: cb0aac98e958c1720eaf311c36b3d29372188f26223022979949528d4091104c
                          • Opcode Fuzzy Hash: be94cb7cfc3cd8444ac11f04680e5f8e06e857b9d45ba6d7f6f85da26437d9a4
                          • Instruction Fuzzy Hash: BB32DF34218B488FE7A5EF18C8997EAB7E1FB88304F50462DA09ED3291DF769544CB43
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %.*z:%u$column%d$rowid
                          • API String ID: 0-2903559916
                          • Opcode ID: 5df1f845a0169827f4ebb929a4d498e5ffb10677090673640a5b631f1ad6e02f
                          • Instruction ID: 37a8bca0b8468da86ec8d38a84eacdfa779a2600d12e9cbe321215c1ea9714e5
                          • Opcode Fuzzy Hash: 5df1f845a0169827f4ebb929a4d498e5ffb10677090673640a5b631f1ad6e02f
                          • Instruction Fuzzy Hash: DC32BD32A09B9685EB588F15D5507BD3BA4FB44B88F8A8235EE5D4B7A4DF3CE841C300
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$database corruption
                          • API String ID: 0-155238906
                          • Opcode ID: 434da0afe0a843df92a2d92c3322ba158b526cb666c47b577ec03a7073e51b4a
                          • Instruction ID: 306f0d818b3d720d20a2c9f04e1123f1a740b20f42af6c9f0e47f1c69739351d
                          • Opcode Fuzzy Hash: 434da0afe0a843df92a2d92c3322ba158b526cb666c47b577ec03a7073e51b4a
                          • Instruction Fuzzy Hash: 3C224C62E0C6D286F7258A2494503B9779ABF84B94F228231DE9E4F7F5DE7CE845C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4$6$row value misused
                          • API String ID: 0-1561282310
                          • Opcode ID: 5a447cc84392f222daed4218e4186f4790ce6c0b03865afd276801cc29a87e65
                          • Instruction ID: f513ec225a1afe59a700f52e9b9f1a4f4893c479494d9f4a7dbe36a033ed2536
                          • Opcode Fuzzy Hash: 5a447cc84392f222daed4218e4186f4790ce6c0b03865afd276801cc29a87e65
                          • Instruction Fuzzy Hash: 93328E72A086858BEB60CF15D440BBD7BA1F785F94F568136DA8E4BBA5CB3CE441CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: database schema is locked: %s$out of memory$statement too long
                          • API String ID: 0-1046679716
                          • Opcode ID: 0f53a5c38835b30bbcbcec31bcc2245aa6736640e18324b5b5b86baf3f8a0e5e
                          • Instruction ID: 658ac34ae408a733c175d6f88570bb1582e827befd37b2fdbf6d6a4d6e2bf92d
                          • Opcode Fuzzy Hash: 0f53a5c38835b30bbcbcec31bcc2245aa6736640e18324b5b5b86baf3f8a0e5e
                          • Instruction Fuzzy Hash: 23227C22A08B8286FB69CF21D5547B977A0FB45F88F0A4135DA8D8B7A5DF7CE490C344
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$database corruption
                          • API String ID: 0-155238906
                          • Opcode ID: 8e9262d8ef864c3c613e53130453f73bf643014a30dfa8d05f7c87cf02335ca1
                          • Instruction ID: da464e400b1608f21aea70790af24eee6585cc3aab1aecabf5ebd0b3e84f59ea
                          • Opcode Fuzzy Hash: 8e9262d8ef864c3c613e53130453f73bf643014a30dfa8d05f7c87cf02335ca1
                          • Instruction Fuzzy Hash: 43717F62B1875287EB649B1AD08063E77A1FB98B94F565139DA4E4BBB0CF3DF4428700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: BINARY$p
                          • API String ID: 0-743207482
                          • Opcode ID: ce0cf3135fe0130cd0845329c03141dee4e8b813658fc461949ffc38931a6a79
                          • Instruction ID: f4e66fcd06a8915d754bc5ddd5d5bd944dcffe331bba169d7c7c689f891ee9d9
                          • Opcode Fuzzy Hash: ce0cf3135fe0130cd0845329c03141dee4e8b813658fc461949ffc38931a6a79
                          • Instruction Fuzzy Hash: 4EA2D272A08A8686EB64DF25D1807BD7BA1FB84B84F428136DB8D4B7A5EF3DD451C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID: GetLocaleInfoEx
                          • API String ID: 2299586839-2904428671
                          • Opcode ID: ddf6b8e3b2590f114d1e39ce45bf1c026e30b68cff69a9460e1018caa995f10b
                          • Instruction ID: a444b28bcf513d2bb9712c8441af77424ea478dfaec3fca902e5cec49b2fbb2b
                          • Opcode Fuzzy Hash: ddf6b8e3b2590f114d1e39ce45bf1c026e30b68cff69a9460e1018caa995f10b
                          • Instruction Fuzzy Hash: 73018B21B08B8286E745AB97F5400A6B760EF88BD0F594039DE4D5BBB5CE3CD9458744
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$rows deleted
                          • API String ID: 0-3120709674
                          • Opcode ID: 5ded48c33ac152c705024983470e06f33181cbf37df0fe89e396c86754ddd954
                          • Instruction ID: f07675737d8adf79a181183e829ce741b6b855fb58e30d958814386bbdff56cd
                          • Opcode Fuzzy Hash: 5ded48c33ac152c705024983470e06f33181cbf37df0fe89e396c86754ddd954
                          • Instruction Fuzzy Hash: 0C826072A087C186EB70DF25E0447AA7BA5FB88B84F564135DA8D4BBA5DF3CE441CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: RIGHT PART OF $USE TEMP B-TREE FOR %sORDER BY
                          • API String ID: 0-1759156464
                          • Opcode ID: 85e8ca64c877a2097d2e3e55b046f10e7ca872548ff6035d304841ca6c7930ad
                          • Instruction ID: 120e34c6dca67e10d1e993c4641dce63e86516bdd49f8dc1153d2713d8367881
                          • Opcode Fuzzy Hash: 85e8ca64c877a2097d2e3e55b046f10e7ca872548ff6035d304841ca6c7930ad
                          • Instruction Fuzzy Hash: 12829E72618A818ADB20DF15D040BAD7FA4F784F88F668235DB8E8B768DB3DD455CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: )$p
                          • API String ID: 0-1764766951
                          • Opcode ID: 421272b06df671110bcbb96d125b78b1997457c6984bab933b9aa6f3bccc1757
                          • Instruction ID: 03f71a6f42e54fba18280bb19c4d556888020d2645ff81f16a3bc511df8dad15
                          • Opcode Fuzzy Hash: 421272b06df671110bcbb96d125b78b1997457c6984bab933b9aa6f3bccc1757
                          • Instruction Fuzzy Hash: C7129234218B488FE7A5DF28C8997AAB7E1FB88304F50452DA09FD3291DB779945CB43
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Expression tree is too large (maximum depth %d)$RIGHT-JOIN %s
                          • API String ID: 0-3209196797
                          • Opcode ID: 6bdc4e3d87ef28e8d4cb3090bc1980dd562276af739fe34276e87d9da798e62e
                          • Instruction ID: 29c5219c1b37db0a2e840a0412f9147d2f844e9e7c62ec0fe71eb592dc1fd722
                          • Opcode Fuzzy Hash: 6bdc4e3d87ef28e8d4cb3090bc1980dd562276af739fe34276e87d9da798e62e
                          • Instruction Fuzzy Hash: 8632AD72A08B8186EB24DF15D1407AA7BA4FB94F84F528235DB8D4B7A9DF7CE451CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: p$siX
                          • API String ID: 0-2543382682
                          • Opcode ID: 91d87498988205396fb95b5f8bce35e2dff831bc6c63c88aad0b90ab928b15b8
                          • Instruction ID: 350f66a8d8b5cfc408b803461f916a4cb35a09d2c0104b9f68bfb689da0ce432
                          • Opcode Fuzzy Hash: 91d87498988205396fb95b5f8bce35e2dff831bc6c63c88aad0b90ab928b15b8
                          • Instruction Fuzzy Hash: 03126B36B08B4186EB60DF56E4446AE77A1FB88B98F164136DE4D5BBA4CF3DE441C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s%cetilqs_$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789
                          • API String ID: 0-3061913499
                          • Opcode ID: 79e5f45c5ac972cc5ede2905bf1b76c27e51d6835a4432ced497a8249ae736b6
                          • Instruction ID: 238277465563e17503c2f6f835becbf9ae55cd0333bb920f06f889631e600f78
                          • Opcode Fuzzy Hash: 79e5f45c5ac972cc5ede2905bf1b76c27e51d6835a4432ced497a8249ae736b6
                          • Instruction Fuzzy Hash: 22B13842B1D7CA07DF0D8B3D645127CABA18759B84F58817AEA9D8B7E6DC2CF602C710
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Expression tree is too large (maximum depth %d)
                          • API String ID: 0-1961352115
                          • Opcode ID: 0d26762867f4d32bc4fdc670b73027a736a2d59be08dd843a354fa051f637e28
                          • Instruction ID: 1a3d49c9d60a1e97c47444916642fd8278ad8433ec3c51731724640aadc3d87f
                          • Opcode Fuzzy Hash: 0d26762867f4d32bc4fdc670b73027a736a2d59be08dd843a354fa051f637e28
                          • Instruction Fuzzy Hash: 8782BC32A0D78682EB648B16D1402BA77E0FB64B94F164236DF5D4BBE9DF3CE4518780
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 7a1f70aac5878618fc27b4bbb8b1710e93b5d2fa79008adcbcc6485344c47f9f
                          • Instruction ID: 15583b663c998b460bad0b4295bc388e10e435b26f46faf5e42bfef02b36bf7f
                          • Opcode Fuzzy Hash: 7a1f70aac5878618fc27b4bbb8b1710e93b5d2fa79008adcbcc6485344c47f9f
                          • Instruction Fuzzy Hash: EB52A322A0C79581EB648B16D04027AB7E5FBA5B94F165035EE8E5B7ECDF3DE841CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: Expression tree is too large (maximum depth %d)
                          • API String ID: 0-1961352115
                          • Opcode ID: 34a6e5e20e9b24df41e93f6d9eefb58c0fdad4450c2412d552c72a54081b2a9f
                          • Instruction ID: 6301964652143069d0f60b74aed9bca5f572a52491a9622e6bf7884fd6819cce
                          • Opcode Fuzzy Hash: 34a6e5e20e9b24df41e93f6d9eefb58c0fdad4450c2412d552c72a54081b2a9f
                          • Instruction Fuzzy Hash: 8B628972A09B8186EB54CF25D1847AD77A8FB48B88F568139EE4D4B7A5DF3DE490C300
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: nth_value
                          • API String ID: 0-3295069819
                          • Opcode ID: 4c66cdc7379dffe4fd20e66b7d3e3fc2b3fe02861234f793d0e83d5af507c5d7
                          • Instruction ID: 01fcb8715728ee5ffdf5510f486c0af81fb6237d421e7ff2c13463b6d30e32fd
                          • Opcode Fuzzy Hash: 4c66cdc7379dffe4fd20e66b7d3e3fc2b3fe02861234f793d0e83d5af507c5d7
                          • Instruction Fuzzy Hash: AD628172619A818AEB14DF25D480BAD3BA1F784F88F568135DB8E4B769DF3CD444CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: :memory:
                          • API String ID: 0-2920599690
                          • Opcode ID: 01d8120b715621296ce3fb142db599264703c9df6a827bc3ccc610bab5870b93
                          • Instruction ID: 92822db32fdb314346bd71694c3c0d1c728badfac5a88496102d1b35600402ce
                          • Opcode Fuzzy Hash: 01d8120b715621296ce3fb142db599264703c9df6a827bc3ccc610bab5870b93
                          • Instruction Fuzzy Hash: 4C427822E0DB8682EB658B66955037927A0FF95B84F164139DE4E4B7B4EF7CF894C300
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: (
                          • API String ID: 0-3887548279
                          • Opcode ID: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
                          • Instruction ID: c583c1b9eefbc5f7172a45ae0950be0d627daafbb0658985ced5e631540ac4b2
                          • Opcode Fuzzy Hash: abcda2cce44acd7600387513da42d6dbaa6d0e49c1554b2389a16b5e095b6a28
                          • Instruction Fuzzy Hash: D9F1A574658B448FEBA9DF2884897AFB6D1F788304F50453EE09BD3291DB379846CA43
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: %s%s
                          • API String ID: 0-3252725368
                          • Opcode ID: 3d4d7d1bd9c7307eeb24ddd32e45d821d4e2ed8b8e1d30334e9bbc6760b1444b
                          • Instruction ID: c77504718f10a1cf8a4d2fa8a3d7526a772c610c461b83a9fe703a83b77c0942
                          • Opcode Fuzzy Hash: 3d4d7d1bd9c7307eeb24ddd32e45d821d4e2ed8b8e1d30334e9bbc6760b1444b
                          • Instruction Fuzzy Hash: E722CC62A09B4281EB248F65D4502BD33A5FF84B98F264632EE5D5B7E5DF3CE442C350
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: gfff
                          • API String ID: 0-1553575800
                          • Opcode ID: cca450176754c46bf21ac8982ee6ab971f96ed00f54e41eaba65e85559b04508
                          • Instruction ID: 19ddfc5991b3994448b5134039e7ca5926c1366f16798972392cadf988dbffdf
                          • Opcode Fuzzy Hash: cca450176754c46bf21ac8982ee6ab971f96ed00f54e41eaba65e85559b04508
                          • Instruction Fuzzy Hash: E632B072A19A818ADB60DF15E440BAD7FA5F784F84F568136DB8E4B7A8DB3CD441CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: p
                          • API String ID: 0-2181537457
                          • Opcode ID: 87a4f4fadbc6888c0203715d688b38bff993bdfe6ee01d37a1eb2aa68f2a8791
                          • Instruction ID: da6217a5eced69c4846a52d8849161b037fdf2b5e1985127892ced2ea10e3bad
                          • Opcode Fuzzy Hash: 87a4f4fadbc6888c0203715d688b38bff993bdfe6ee01d37a1eb2aa68f2a8791
                          • Instruction Fuzzy Hash: 8C226E72A08A828AEB60DF15D040BA93BA1FB85FC8F568135CE4E5B7A5DF3DE455C700
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: sqlite_stat1
                          • API String ID: 0-692927832
                          • Opcode ID: 62995e8ffe89db7e16c3332a6130806eab158480cd25a03722bf3d80ea9bce6f
                          • Instruction ID: de3905d6c7a79640d05c8dd7369e99f7d4e12d1d0983bd859e2a4795c451214a
                          • Opcode Fuzzy Hash: 62995e8ffe89db7e16c3332a6130806eab158480cd25a03722bf3d80ea9bce6f
                          • Instruction Fuzzy Hash: 8012E472A086818AEB608F65D5407BE7BA4FB95F84F064135EB8E4BBA5DF3CD441C740
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8
                          • API String ID: 0-4194326291
                          • Opcode ID: 6b67e5068f6b5c119f0bffc7c64d18de370588fa1bf746384f48e482c057c185
                          • Instruction ID: 15c938ec76aae44d9fea98ce8525d2e629490e5ac47a36378cd68cdf071848a3
                          • Opcode Fuzzy Hash: 6b67e5068f6b5c119f0bffc7c64d18de370588fa1bf746384f48e482c057c185
                          • Instruction Fuzzy Hash: 56D1EB34258B488BE766EB18D89A7EAB3D1F784304F50453DA45BD32D2DF7799018A83
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: L
                          • API String ID: 0-2909332022
                          • Opcode ID: 478220aae51809fbfcec016796735ebdd5260293ee67cc10018442a66457af5a
                          • Instruction ID: aad98cf98cc4ed46d7dc368955712ac493b36e16155ac801b38cb6030caa1854
                          • Opcode Fuzzy Hash: 478220aae51809fbfcec016796735ebdd5260293ee67cc10018442a66457af5a
                          • Instruction Fuzzy Hash: 4402AF726186818AE760DF16D080B7A7BA0FB85F84F125235DB8A4BB65EF3DF551CB00
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID: 0-3916222277
                          • Opcode ID: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
                          • Instruction ID: 09e9b2eaddf535d162158c08903bd1cdac3d61363e5087bb30a25682559184e4
                          • Opcode Fuzzy Hash: 990200c829865227b6571aa3573083370787801c1570d2fe66e4a338792caab8
                          • Instruction Fuzzy Hash: 7AA11B352586448BE755AB2CD89A37EB7D1FB88304F40453CF09BD3292DA7BD9428B83
                          APIs
                            • Part of subcall function 00007FFE013FA524: GetLastError.KERNEL32 ref: 00007FFE013FA533
                            • Part of subcall function 00007FFE013FA524: FlsGetValue.KERNEL32 ref: 00007FFE013FA548
                            • Part of subcall function 00007FFE013FA524: SetLastError.KERNEL32 ref: 00007FFE013FA5D3
                          • EnumSystemLocalesW.KERNEL32(?,?,?,00007FFE01402E3F,?,00000000,00000092,?,?,00000000,?,00007FFE013FBB0D), ref: 00007FFE014026E6
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystemValue
                          • String ID:
                          • API String ID: 3029459697-0
                          • Opcode ID: 3f1b1e3eb3dc78c35f4179ae3ba720a2dfa3b9b342b5332880479f1ba560979a
                          • Instruction ID: 718bd8bf900d439ef154da0add56db1647e405bcaaa503517e0cc08c4c782ea2
                          • Opcode Fuzzy Hash: 3f1b1e3eb3dc78c35f4179ae3ba720a2dfa3b9b342b5332880479f1ba560979a
                          • Instruction Fuzzy Hash: 6211D267E186458AEB169F66D444AB877A0FB50BA0F458139CA2D4B3F0CBBCD9D1C740
                          APIs
                            • Part of subcall function 00007FFE013FA524: GetLastError.KERNEL32 ref: 00007FFE013FA533
                            • Part of subcall function 00007FFE013FA524: FlsGetValue.KERNEL32 ref: 00007FFE013FA548
                            • Part of subcall function 00007FFE013FA524: SetLastError.KERNEL32 ref: 00007FFE013FA5D3
                          • EnumSystemLocalesW.KERNEL32(?,?,?,00007FFE01402DFB,?,00000000,00000092,?,?,00000000,?,00007FFE013FBB0D), ref: 00007FFE01402796
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLast$EnumLocalesSystemValue
                          • String ID:
                          • API String ID: 3029459697-0
                          • Opcode ID: 5501cd416a1d754832eb2aab725368e657402348989c4a7e402598e2c7d5e552
                          • Instruction ID: 25669d8c7a792d527d152a4b549e7d30d6d448dff9cf34ca1ec79e1fe9d3b904
                          • Opcode Fuzzy Hash: 5501cd416a1d754832eb2aab725368e657402348989c4a7e402598e2c7d5e552
                          • Instruction Fuzzy Hash: 6301B172E0828286E7125F96E444BB976E1EB40BA4F458239D66D4B2F4CFBC98858700
                          APIs
                          • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FFE013FAD0B,?,?,?,?,?,?,?,?,00000000,00007FFE01401C80), ref: 00007FFE013FA9F7
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: EnumLocalesSystem
                          • String ID:
                          • API String ID: 2099609381-0
                          • Opcode ID: 6b0a6223b7cf5906a18646ad8956f3befa6e53c9cb96d98eea890e9931d18a90
                          • Instruction ID: 6c94010b26b98bd2e1db88ab5e19cbf6001b90f84d93cffa79b32c9eae4206c7
                          • Opcode Fuzzy Hash: 6b0a6223b7cf5906a18646ad8956f3befa6e53c9cb96d98eea890e9931d18a90
                          • Instruction Fuzzy Hash: 49F0AF72B08B8583E700EB25F8905A93361FBA87C0F958039DA4D9B374DE3CE5918300
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Time$FileSystem
                          • String ID:
                          • API String ID: 2086374402-0
                          • Opcode ID: bda6ed82e027d74987d1db50b8e518f77e0611497fcd5cb496a64431374b2807
                          • Instruction ID: 4d04e0e66fbebeabaac3f8a46169fdb3f9e14809f6467d17526c93c02f6cb131
                          • Opcode Fuzzy Hash: bda6ed82e027d74987d1db50b8e518f77e0611497fcd5cb496a64431374b2807
                          • Instruction Fuzzy Hash: B7F0E9E1F2968942EF24A755941137852429F5CBF0F009339ED3E5E7E9EE2CE0504300
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 87582c9bebe7a3e4c7d159f22016cb2b02e1682909312de42912900847b5cbe1
                          • Instruction ID: 4105d654c96517c39dfa60bfc9c48f5030e25d308ee1742a42e683d961c8c092
                          • Opcode Fuzzy Hash: 87582c9bebe7a3e4c7d159f22016cb2b02e1682909312de42912900847b5cbe1
                          • Instruction Fuzzy Hash: 91E06772615B10A5F7009BB4E46479E3774F3417BCF501745AFB426AD9CBB983488344
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
                          • Instruction ID: a79d38f32fce6ea66ea28c02a9edd7fa8d7ab86536b66a0f712fa606b8d57652
                          • Opcode Fuzzy Hash: c77ee9db95c24773db9081a7deccb5cf2f36f3081fec3039551d8f54b381666b
                          • Instruction Fuzzy Hash: D772B478360A058BFF5A9B289CDA7A933D6FB8C340F854074A857D72C5CE77E841CA52
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d1c26f94e001009ceeff9b25b996670fbf22535e96e30090b0422cf688ba8a0f
                          • Instruction ID: 5d13f6cde8185690d8d42c2d3b5377ad6d4349cca3817bc41e990a21a3a94998
                          • Opcode Fuzzy Hash: d1c26f94e001009ceeff9b25b996670fbf22535e96e30090b0422cf688ba8a0f
                          • Instruction Fuzzy Hash: E7A282B2A19B818AEB10DF19C041BAD7BA1F7A4F48F568136DA4E4B7A9DF3DD441C700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1b5a7939cd80df77f78470cfcdbaac86cec07939c3a871c21a9c402b1ddd94c
                          • Instruction ID: 865c3f31d941885814f9bfb69b83a32f80c83318811fe4ebecd2faf2092d5fde
                          • Opcode Fuzzy Hash: b1b5a7939cd80df77f78470cfcdbaac86cec07939c3a871c21a9c402b1ddd94c
                          • Instruction Fuzzy Hash: 47524D72A08B8686EB60CF16E4447B977A4FB85B94F464135DE8D4BBA4DF3CE484CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bce10308d26f1e608ba220d5ad9824a985c8af5d3ccc692004c464b560a4cff2
                          • Instruction ID: d8cf7bbd4f6db688acb7a34956316813a33317c550660db76068d2fb49cd51c6
                          • Opcode Fuzzy Hash: bce10308d26f1e608ba220d5ad9824a985c8af5d3ccc692004c464b560a4cff2
                          • Instruction Fuzzy Hash: 2A429172619A818AD760CF15D090BAD3BB0F784F88F568135DB8E4BB69EB3DE451CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e85f5a95eb0344a530453e3b24b5230fd56c2c77a4411218a7e9eb9391d776bf
                          • Instruction ID: 2909d82fd55170f1db71bc62102bef1a9ee911bd3f3f354afc14093d68e78021
                          • Opcode Fuzzy Hash: e85f5a95eb0344a530453e3b24b5230fd56c2c77a4411218a7e9eb9391d776bf
                          • Instruction Fuzzy Hash: D2228B76B09B8286EB64DB5AD48436977A0FB88F84F029036CE4D5B771CF3CE8958744
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4268b6c979d72500600cd7bade4e6cf27a5649bde7adde496e2e793c183ab8e
                          • Instruction ID: 55f460f11885deff1371cb2f44365c7d5fbc1895346a3d8e6693f2f3082e22c2
                          • Opcode Fuzzy Hash: d4268b6c979d72500600cd7bade4e6cf27a5649bde7adde496e2e793c183ab8e
                          • Instruction Fuzzy Hash: 32F18F34258B488FE765EB28D4997AAB7D1FB88304F10463D949BD3292DF379845CB43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID: FreeHeap
                          • String ID:
                          • API String ID: 3298025750-0
                          • Opcode ID: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
                          • Instruction ID: 972a2b125e1bd4e52ad492ec9af2aa0a88d5eb17acbe65c309a0b90018afad04
                          • Opcode Fuzzy Hash: 9aa099fc02c16ba095d4bf4291fdb0dcd3e10970e4b1abe0c916cefc9fc1f856
                          • Instruction Fuzzy Hash: 7FE16634258B488BE755EB1CD89A36AB7D1FBC8304F50452DA09BD3292DE7BD9418B83
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
                          • Instruction ID: d90bd2d2c57b710be84a42132784f4f74a63322dc4a6e8e02c9ecde6fec9da42
                          • Opcode Fuzzy Hash: 67e5cb04a7b8afc38bfdb1fe03543906a8b7734bb26e47d94f1bfbbc31827fd8
                          • Instruction Fuzzy Hash: 08E1D834268B488FE756EB2CC49A76AB7D1FB89344F50453DA09BD3292DE77D8018B43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e9cb904ff898f0cd07191ba6fd6bf6cd41ad634501b5e061c1ce7f67f1b18ccd
                          • Instruction ID: cf299fba9b76892b44a27d02ec96434904018c4081fdc6917ce97d4a36002a44
                          • Opcode Fuzzy Hash: e9cb904ff898f0cd07191ba6fd6bf6cd41ad634501b5e061c1ce7f67f1b18ccd
                          • Instruction Fuzzy Hash: AC228D62A1C78286E760CB25E5407BD3BE5FB68784F065135EE4D9BAE8DB3CE550CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c5b8185ffa5e425ac5672294442339b9676011be98afc1e05e448be90b784a7
                          • Instruction ID: 9f34aa91830ab0163815536ce119d2610a89be3df3105ecb62f5b77f7afd48a4
                          • Opcode Fuzzy Hash: 4c5b8185ffa5e425ac5672294442339b9676011be98afc1e05e448be90b784a7
                          • Instruction Fuzzy Hash: 04126E76B09A8686EB608B5AE88472E77B4FB84B84F524035DE8D4B774DF3DE845C700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
                          • Instruction ID: 0b98c885bafae9cd57ccf7cdbc3677868761f66ca06e5af31978fc849e07a1bd
                          • Opcode Fuzzy Hash: d67f70248d9871493b444570412385d01f8192461fdcfc939c1c5d9bc251a4ce
                          • Instruction Fuzzy Hash: D8C19334328B448FE755EB2CC49A76AB7D1FB89308F50452DA09BD3292DB7AD9418B43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a1ed813a0efaa55299fd38e73dfe6d2f712fde8d2b4ad995ab00ca54d5939209
                          • Instruction ID: 469a2a62d28a51199b38e10e65d4646e974dc3e655b780fd8b93da3ab964f139
                          • Opcode Fuzzy Hash: a1ed813a0efaa55299fd38e73dfe6d2f712fde8d2b4ad995ab00ca54d5939209
                          • Instruction Fuzzy Hash: 6E129432A19A8186DB50DF15D090BAD3BA1F794F88F568236CB8E4B769DF3CE455C700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd26b64c9d1f3f06ac55391d0e3bf786ea7103685a080d01c4bf1d5f1593e05f
                          • Instruction ID: 408338af2e2a2c2e2cc355ee7dfab5359876c96416954b36654d41960d800951
                          • Opcode Fuzzy Hash: fd26b64c9d1f3f06ac55391d0e3bf786ea7103685a080d01c4bf1d5f1593e05f
                          • Instruction Fuzzy Hash: 8C12C272A186818AD760DF2AD441BAD7BA0F784F88F468135DB4E4BB69DF3CE441CB40
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6a82b3215b32b201a3b488b237311b68fdf40bd6e280f0fe68ad1ecac2f78089
                          • Instruction ID: 8b62ad9e20b2d91dbc8b9532fbbe8abbde3e538c06c270cce524834114e9d0b1
                          • Opcode Fuzzy Hash: 6a82b3215b32b201a3b488b237311b68fdf40bd6e280f0fe68ad1ecac2f78089
                          • Instruction Fuzzy Hash: 4CF14E76F09A568AEB10CFA5D4802AD37B1FB48798F424135DE0D6BB68DE7CE815C740
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ef79badb1275741fda65e0c80cded77a85b2722d8b4bb4ccdc40576210651e25
                          • Instruction ID: 93e7744e2c955550d925ab908aee3d8688bcd0b1576d2b0e0d4fbbb287d86bf3
                          • Opcode Fuzzy Hash: ef79badb1275741fda65e0c80cded77a85b2722d8b4bb4ccdc40576210651e25
                          • Instruction Fuzzy Hash: 21D16963E1C7D186FB368724E4203BC6BA1EB61750F8A45B5C39A0BBE1DA2DD545C311
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548461707.0000026AECD61000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000026AECD61000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_26aecd61000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
                          • Instruction ID: d547922a91928b06d3a3cd59346c2b74cea2ff2485cce5ae345bf37cb05872aa
                          • Opcode Fuzzy Hash: 2428df4c2b5cda2abb3800129e89791470056923b1d70c4f1012cb95f183359f
                          • Instruction Fuzzy Hash: ACB14F74218B488FE7A8DF1CC499BAAB7E1FB99304F50452DA08ED3291DB76D845CB43
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3ac3ff416e8dab6c36538aed586f309d236c5f8a5e7d4a34461dbbd6eca2443
                          • Instruction ID: b7978aaca029df15ceab0a0ce3c22c57836141c061f723b9f471520d3df86a95
                          • Opcode Fuzzy Hash: f3ac3ff416e8dab6c36538aed586f309d236c5f8a5e7d4a34461dbbd6eca2443
                          • Instruction Fuzzy Hash: C9D1D3B2B1D78187EB648F2AD08137D67A1FB46B84F159035DE4E4B7A5CE3DE4858700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 18ac38aa2fe8bcd28d399c926bbba0b7e6fbf5d90d0f7448f588db00ab38c5d5
                          • Instruction ID: 227af23be244e8f840f0f611b1f4ec8913010fac8ad48e8fc753f647b0e60a50
                          • Opcode Fuzzy Hash: 18ac38aa2fe8bcd28d399c926bbba0b7e6fbf5d90d0f7448f588db00ab38c5d5
                          • Instruction Fuzzy Hash: CFB18C77B106648FE318CFB998418DD7BE1F388748750462AEF17D3B44EA74AA56CB80
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 4023145424-0
                          • Opcode ID: cf9b97d7cc483afff70f3a3d20c81dd90e8c6ed473082f89619dd5e72547d075
                          • Instruction ID: 62302f2745cc83a0d00c0e9607210e77f61898bb3d67b9361452bb806b0e93f2
                          • Opcode Fuzzy Hash: cf9b97d7cc483afff70f3a3d20c81dd90e8c6ed473082f89619dd5e72547d075
                          • Instruction Fuzzy Hash: 93C1E7A6B086C285EB60AF61D5107BAA7A4FF84788F414039EE4D6B6EDDF3CD504C701
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 751e48c6b89df9bcf41dba2fe0b1d5c5adbad5e4920f81634528e1558f8acf8e
                          • Instruction ID: 4ed1a9f0c5a388ef6595c21c634432a6185ff4c5952cff30f3676a59e8446455
                          • Opcode Fuzzy Hash: 751e48c6b89df9bcf41dba2fe0b1d5c5adbad5e4920f81634528e1558f8acf8e
                          • Instruction Fuzzy Hash: 7ED19472A18B818AE750DF25E540BAE7BA4F794B88F119235DE8D47B69DF3CD051CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f8a1def9a490e3ade9ce55c21f00aaaaa3a826b5da76908a59614d9ce2aee6d3
                          • Instruction ID: 7c06c2a56f80f94294aa252da9ef81170e5e9d511a1167afd298801840b142dc
                          • Opcode Fuzzy Hash: f8a1def9a490e3ade9ce55c21f00aaaaa3a826b5da76908a59614d9ce2aee6d3
                          • Instruction Fuzzy Hash: C8B17C72F04A558AEB10CFB6D4816AD77B2FB48B88B024535DE0D67B68DE3CD806C780
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 406dcc27e4e7ac63449c9c517ce1bf9e29620da6dafbc456747df58ca3807661
                          • Instruction ID: 5e85cb097e417c4cd386226fd6c6ef12ca013915e0d7d7f24a3c27002c587fe1
                          • Opcode Fuzzy Hash: 406dcc27e4e7ac63449c9c517ce1bf9e29620da6dafbc456747df58ca3807661
                          • Instruction Fuzzy Hash: 24917C62B1878587DB18CF2C910437C77A1F798B48F95A228DB5A87B51EB3CE685C700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3215553584-0
                          • Opcode ID: 3d3be46f2ecb87892e1911f91da2774aebb2273f689d7041ca54b41c0f4b1c77
                          • Instruction ID: 5188bd4e6147fddd5a08cf1ed1d1730b7a311a5a8d97d6abbb7ec2d850dac77d
                          • Opcode Fuzzy Hash: 3d3be46f2ecb87892e1911f91da2774aebb2273f689d7041ca54b41c0f4b1c77
                          • Instruction Fuzzy Hash: 0E81A372A04A9585EB64EF29D48237D3360FB44B98F56463AEF1EAB7A5CF3CD0518340
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 24cab641b06e301bd0ea6670f61f5b8643485071a42dfd5a6d8b5d5fd2df9db7
                          • Instruction ID: 116e8d78a77c4c876c93d00e0ae39602d77b405855cb5653b2142d5ec05356ff
                          • Opcode Fuzzy Hash: 24cab641b06e301bd0ea6670f61f5b8643485071a42dfd5a6d8b5d5fd2df9db7
                          • Instruction Fuzzy Hash: 8891BC62E18B8682E705CF29911427C77A4FB98B88F1AE235DB4D47766EF3CE5918340
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e28e8264853b8d8a58b4bc98b4794268070b3f7229a2536823b2e08521162688
                          • Instruction ID: 5b38cde9c25a8afe7ce723d04f0795580dcc3154dab9227ebc4b43036985c735
                          • Opcode Fuzzy Hash: e28e8264853b8d8a58b4bc98b4794268070b3f7229a2536823b2e08521162688
                          • Instruction Fuzzy Hash: E281E663A0C99282F714CB16955117BABA1FB91B94F034032EE8D5B7B5DF3CE442DB11
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9f36d36e8b577014ed520573b28e8af05decb50f5d9a63111295d2c1c6783dc6
                          • Instruction ID: 6df766e0e3cde3a6b1f521a0269a58b0895c5d961c6b23b400bbd2bf0f445ac2
                          • Opcode Fuzzy Hash: 9f36d36e8b577014ed520573b28e8af05decb50f5d9a63111295d2c1c6783dc6
                          • Instruction Fuzzy Hash: 5761E472A186A586E7208F15E44167A7BA0F789BC4F165132EFCE4BB64DF3DD941CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d063c41d688151cab6f20f8f2de51a63d07d51dbfdf167c3fd7e8c928c60c106
                          • Instruction ID: e2cbdde78080eaca0ad8110f7bca18b062ee31b915b5071935b346c19a093904
                          • Opcode Fuzzy Hash: d063c41d688151cab6f20f8f2de51a63d07d51dbfdf167c3fd7e8c928c60c106
                          • Instruction Fuzzy Hash: B491C122A0CBC685E7328B28A4456FABBA4FB89784F455235EE8D4B775DF3CD141CB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d3c99d5806c2a2077ccc8b3489acfaa95e3ecd85dd21d1acc95e3badb75ceb24
                          • Instruction ID: bfa3175f42de2933ebd9866f2a3b0336d4bd09c84a736b225079aaf16a99445e
                          • Opcode Fuzzy Hash: d3c99d5806c2a2077ccc8b3489acfaa95e3ecd85dd21d1acc95e3badb75ceb24
                          • Instruction Fuzzy Hash: 6661E032A0869185EB249B26A454FAFB7A5FB45FC4F965135EE8D0FB6ADE3CD000C700
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 70a415baf843f345d083c0d973dc3e42ad1215a5686fff7d8fe97db61a72f22e
                          • Instruction ID: eda3e63ae62e8cb04edfa1dfa6c19e50ac4b7a5b26d332ae887f4f4ade6388de
                          • Opcode Fuzzy Hash: 70a415baf843f345d083c0d973dc3e42ad1215a5686fff7d8fe97db61a72f22e
                          • Instruction Fuzzy Hash: F8518D72E1C7519AEB64DA2594001BA67E1FB54BC4B0B9471DE4D0F6ACDF3CE8428740
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3941cfbd6796fb25c625dc9a1d3ec830ef6782199b8fc75aa4aaec98026999c4
                          • Instruction ID: ae6de883d30d95509e489baefba10cd2932bcf67f2c9729d64e158e8cbd66bdf
                          • Opcode Fuzzy Hash: 3941cfbd6796fb25c625dc9a1d3ec830ef6782199b8fc75aa4aaec98026999c4
                          • Instruction Fuzzy Hash: 3A5179623087F846DB098729A4442BEBEA5F345381F429032EEC95BFB6D63CE845DB00
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8bb5831347f65725b233d05e29be0b48178cbe697d662fc4a6736bd2425b0af4
                          • Instruction ID: 362ead77cd8bb35a216435614de81949ac1654d83e04b45837c799dca011ae14
                          • Opcode Fuzzy Hash: 8bb5831347f65725b233d05e29be0b48178cbe697d662fc4a6736bd2425b0af4
                          • Instruction Fuzzy Hash: 0B4189A3A6A3C54FEB0D45AC08122E66F50E337A10F89977CD584DB3D7C40CCA66E395
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 16ed5a33316d43cd1172c21d097fc726b5d164f5c989eca7a35a37f110ce1b0c
                          • Instruction ID: 7d386a683352489559d88e8c1f82f490579ff447ed08c862cb45de5f76fcc150
                          • Opcode Fuzzy Hash: 16ed5a33316d43cd1172c21d097fc726b5d164f5c989eca7a35a37f110ce1b0c
                          • Instruction Fuzzy Hash: B82132C660A6D48EEF42CBA988523B87F91D7777C8F59E066D28C0ABA6C51DD10AD310
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: File$Handle$CloseCreateErrorLast$InformationSizeSleep
                          • String ID:
                          • API String ID: 142978218-0
                          • Opcode ID: 26862680f932b182a8d9d2cc3b4f95d5efc313cd42107615d5aecd2772f46e7c
                          • Instruction ID: 11073d90213d342b84509ccb3ec9cb801b0883135b460e617491915f99b75fe2
                          • Opcode Fuzzy Hash: 26862680f932b182a8d9d2cc3b4f95d5efc313cd42107615d5aecd2772f46e7c
                          • Instruction Fuzzy Hash: 1D716031E08A4286F7619B25A55473A62A0BF89FB4F114334E9BD0BBF4DF3DE8498704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Count64Tick$Sleep
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$API call with %s database connection pointer$destination database is in use$invalid$misuse$source and destination must be distinct
                          • API String ID: 417912201-3158697872
                          • Opcode ID: b081c2a26e7da91c4aeedb44f17af51f8224c98c509d5ffbfbcf2ae96c53074a
                          • Instruction ID: e8e1d726ef5cd7bed7385d0d02279f7522fb7a667520e81ce7282e374a6ca56c
                          • Opcode Fuzzy Hash: b081c2a26e7da91c4aeedb44f17af51f8224c98c509d5ffbfbcf2ae96c53074a
                          • Instruction Fuzzy Hash: 65516B61E08B4286FB559B26E9446B923A1FB84F84F568136DE4D0B7B5CF3CE891C384
                          APIs
                          • FreeLibrary.KERNEL32(?,?,?,00007FFE013FB12C,?,?,?,?,00007FFE013F6402), ref: 00007FFE013FABA0
                          • GetProcAddress.KERNEL32(?,?,?,00007FFE013FB12C,?,?,?,?,00007FFE013F6402), ref: 00007FFE013FABAC
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: AddressFreeLibraryProc
                          • String ID: api-ms-$ext-ms-
                          • API String ID: 3013587201-537541572
                          • Opcode ID: 7562c84af24565a34be147bf0d63188374f690327f7759320bb3070aed37f4fe
                          • Instruction ID: f32b94e5c272db8b009128e23e79f8cd461cbf49ac9166edbaa2a40b67e67e6b
                          • Opcode Fuzzy Hash: 7562c84af24565a34be147bf0d63188374f690327f7759320bb3070aed37f4fe
                          • Instruction Fuzzy Hash: 7E412622B19A4741FB16EB16A9145753392BF45BE0F0A863DDD1D9F7B4EE3CE8458300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Count64Tick$Sleep
                          • String ID: %s at line %d of [%.10s]$05941c2a04037fc3ed2ffae11f5d2260706f89431f463518740f72ada350866d$API called with finalized prepared statement$misuse
                          • API String ID: 417912201-2356847551
                          • Opcode ID: 14dbfe15db05f7460b2fb4c622cd54e52d52a6ca8ea0413059ae43ca11291b19
                          • Instruction ID: 07b719cfb08a79b72974f65f939bcf04420c95d37190bfaef414a4a688f51435
                          • Opcode Fuzzy Hash: 14dbfe15db05f7460b2fb4c622cd54e52d52a6ca8ea0413059ae43ca11291b19
                          • Instruction Fuzzy Hash: 13219F21F08B4286FB659BA6E9802B9A3A1FF44F90F418035DA5E4F7B5DF6DE8458304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: f$p$p
                          • API String ID: 3215553584-1995029353
                          • Opcode ID: c9ad3ceda9924f7410024becc4520081b5d7fe8b9201ec39d397413a1bd7d468
                          • Instruction ID: 4e2bd7f661c5a4bacc20434c17c281cbeef5b7cd756aae6ed5ea786fe76a8304
                          • Opcode Fuzzy Hash: c9ad3ceda9924f7410024becc4520081b5d7fe8b9201ec39d397413a1bd7d468
                          • Instruction Fuzzy Hash: D012B462E0C2C386FB24BF14D0546B976A2FB40754FD6413AE6996B6E4DF3CE9848B10
                          APIs
                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE013F5EBB,?,?,?,00007FFE013F2A40,?,?,?,?,00007FFE013F2879), ref: 00007FFE013F5D81
                          • GetLastError.KERNEL32(?,?,?,00007FFE013F5EBB,?,?,?,00007FFE013F2A40,?,?,?,?,00007FFE013F2879), ref: 00007FFE013F5D8F
                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE013F5EBB,?,?,?,00007FFE013F2A40,?,?,?,?,00007FFE013F2879), ref: 00007FFE013F5DB9
                          • FreeLibrary.KERNEL32(?,?,?,00007FFE013F5EBB,?,?,?,00007FFE013F2A40,?,?,?,?,00007FFE013F2879), ref: 00007FFE013F5E27
                          • GetProcAddress.KERNEL32(?,?,?,00007FFE013F5EBB,?,?,?,00007FFE013F2A40,?,?,?,?,00007FFE013F2879), ref: 00007FFE013F5E33
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Library$Load$AddressErrorFreeLastProc
                          • String ID: api-ms-
                          • API String ID: 2559590344-2084034818
                          • Opcode ID: 97cf97467306c0c550e19c554bc7348bfd4a3b55111874371f74137d8fa85d2a
                          • Instruction ID: b6df43d878d7f632f2f7f3afabe88c63eee78500e5a048a4711cdc648bae4893
                          • Opcode Fuzzy Hash: 97cf97467306c0c550e19c554bc7348bfd4a3b55111874371f74137d8fa85d2a
                          • Instruction Fuzzy Hash: A431C422A1AA8281EF16EB12A90467962D4FF48B60F5A4539ED1D5F7B4EF3CE4458300
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: b9a1ac309250ead7b6ce62fd7431341ae0cb016c43f98512d52d2251d7bf1373
                          • Instruction ID: 2cfe8172eaf964d6863e887d459a7abd449e967272827e9e0edb4e13d5cefc10
                          • Opcode Fuzzy Hash: b9a1ac309250ead7b6ce62fd7431341ae0cb016c43f98512d52d2251d7bf1373
                          • Instruction Fuzzy Hash: 1C215E20F0D2C782FB55B721965953D7252AF487A4F56463CE97E6FAF6EE2CE8408200
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Wow64$CreateFileRedirection$DisableErrorLastRevertSleep
                          • String ID:
                          • API String ID: 816130295-0
                          • Opcode ID: 8bc8b1338c340a8ddbdd9b67acbd75ea5fbde127c461d89fcb9100d212f640d4
                          • Instruction ID: 436ef2c86d89c517f71fc7d148c69cf82e0b1d963532ac5ac85cce2b66c38680
                          • Opcode Fuzzy Hash: 8bc8b1338c340a8ddbdd9b67acbd75ea5fbde127c461d89fcb9100d212f640d4
                          • Instruction Fuzzy Hash: 5E51D532F1869182F7754A29E40473A6591BB94BA0F504339DEAE4BBF5CF3DDC458B08
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: FileLock
                          • String ID:
                          • API String ID: 3169042693-0
                          • Opcode ID: b36627909b426c5d2d265d94e02e54517e320222c7ed38f17ffb1feb783f61bc
                          • Instruction ID: 5716b9dfca5031ba97f99552c2e2506de741eff71c6d3d8cadc25f998a5f6f87
                          • Opcode Fuzzy Hash: b36627909b426c5d2d265d94e02e54517e320222c7ed38f17ffb1feb783f61bc
                          • Instruction Fuzzy Hash: 72418132F18B4186EB608B25B48462FB3A6F788B94F558135EA9C47B68DF3CD484CB04
                          APIs
                          • GetLastError.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA6AB
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA6E1
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA70E
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA71F
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA730
                          • SetLastError.KERNEL32(?,?,?,00007FFE013F8239,?,?,?,?,00007FFE013F97EB,?,?,00000000,00007FFE013FA7BA,?,?,?), ref: 00007FFE013FA74B
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Value$ErrorLast
                          • String ID:
                          • API String ID: 2506987500-0
                          • Opcode ID: 659d54af87f3e3197771c75a9b8051b0d31e11a352b3fda74e1bb30c80f9d6c9
                          • Instruction ID: ec85759d81c1084e0a48ba94d60d6d11199733277e65680b8a2193028b667a68
                          • Opcode Fuzzy Hash: 659d54af87f3e3197771c75a9b8051b0d31e11a352b3fda74e1bb30c80f9d6c9
                          • Instruction Fuzzy Hash: 8A115C24B0D2C242FB55B762A55553932929F987B4F16473CE83E6FAF6EE2CA4418700
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: CreateFile$CloseErrorHandleLastSleep
                          • String ID:
                          • API String ID: 4217092948-0
                          • Opcode ID: a2ff643abf45aec6c4c85093942659c5441a63467c0d701a9e44b994c773c3d4
                          • Instruction ID: 12326723e1807166acd6da4763d36bac307380c9780108c1d75d265c2de8d2e2
                          • Opcode Fuzzy Hash: a2ff643abf45aec6c4c85093942659c5441a63467c0d701a9e44b994c773c3d4
                          • Instruction Fuzzy Hash: 6D216D71A0874582E7608B66A64473A7690FB99BF8F144735EEB90BBF8CF3CD4498740
                          APIs
                          • FlsGetValue.KERNEL32(?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013FA783
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013FA7A2
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013FA7CA
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013FA7DB
                          • FlsSetValue.KERNEL32(?,?,?,00007FFE013F6B7E,?,?,?,00007FFE013F6BC7,?,?,00000000,00007FFE013F9A3B), ref: 00007FFE013FA7EC
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: 90ec7c1a636f1d95c84cb412225ef5d14ba7aca8b717b7e8385991f0027740e3
                          • Instruction ID: 3cbafdefa7be34ca7b4f2971be644e002913493d83ce21b2af51fb8c5f3206f8
                          • Opcode Fuzzy Hash: 90ec7c1a636f1d95c84cb412225ef5d14ba7aca8b717b7e8385991f0027740e3
                          • Instruction Fuzzy Hash: 67119D60F0C3C202FB59B722A55163932526F443A0F06833CE83E6FAF6EE2CE4418200
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Value
                          • String ID:
                          • API String ID: 3702945584-0
                          • Opcode ID: ea511fab9fff80f39c8c8f765a17b1fe5af6f23b8e7e1f80ec0b2e79d8b852b7
                          • Instruction ID: 6d03564ab7da9c8e21a6f3b64d80c3422032fa6638b764a79d7333fba721e6c8
                          • Opcode Fuzzy Hash: ea511fab9fff80f39c8c8f765a17b1fe5af6f23b8e7e1f80ec0b2e79d8b852b7
                          • Instruction Fuzzy Hash: CB112790A0D28702FF59B726946667932814FA4375F5A4B3CE83E6F6F2ED2CB4418241
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Count64Tick$Sleep
                          • String ID: e
                          • API String ID: 417912201-4024072794
                          • Opcode ID: d8d85095fabac17001ec52283b05e35ec8faecd96f452eb79881bf3bb05c31bf
                          • Instruction ID: d07dafd80b6bec03b99ee4b42138e1c3b1f1f63aa14b3c72a1111d5a111f3d0d
                          • Opcode Fuzzy Hash: d8d85095fabac17001ec52283b05e35ec8faecd96f452eb79881bf3bb05c31bf
                          • Instruction Fuzzy Hash: FE414A23A09A4286EB568F2AD44037923A1FF94F54F5A8135DA4D0B7B4CF3CE886C744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: Count64Tick$Sleep
                          • String ID: unknown database: %s
                          • API String ID: 417912201-159662586
                          • Opcode ID: f041a6b858bdea5b80568aa1f82bf390a6326fd5199faca200ed2a87d417fd01
                          • Instruction ID: df6c1a537286beaa814ce5278cbdc2a7a57805dc2d625dd150949d2362c24534
                          • Opcode Fuzzy Hash: f041a6b858bdea5b80568aa1f82bf390a6326fd5199faca200ed2a87d417fd01
                          • Instruction Fuzzy Hash: 4D419222E0868285F7658F6A98403796390FF80F94F168135DD5D4F7B4DE3CE4428704
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                          • String ID:
                          • API String ID: 2933794660-0
                          • Opcode ID: 254015043cd6163a033e16cf8cead884c9bc0520b6899ec2c18d6ce2124c9aa3
                          • Instruction ID: 5dd947dd313eb4a830c23d8d1b952b3a89e77f06a396f823291771d152007108
                          • Opcode Fuzzy Hash: 254015043cd6163a033e16cf8cead884c9bc0520b6899ec2c18d6ce2124c9aa3
                          • Instruction Fuzzy Hash: 5F112E26B14F0689EB00CF61E8552B833A4FB19758F440E35EE6D8A7B4EF7CD5988340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: new[]
                          • String ID: %s%c%s$\
                          • API String ID: 4059295235-3534329225
                          • Opcode ID: a4ae827f49f27f6dd31bf8e6d12bc8a602828c457c4dbade2a7348c5239b154d
                          • Instruction ID: 339e20282b4aea5ffd2f7ac575c3997bb7b60b3224f0671c3f1a8452a4c4c391
                          • Opcode Fuzzy Hash: a4ae827f49f27f6dd31bf8e6d12bc8a602828c457c4dbade2a7348c5239b154d
                          • Instruction Fuzzy Hash: 3E41E152E0CB8781FF169B62A8106BE67D0AF84B84F0A5135ED4D0F6F6DE3CE8819315
                          APIs
                          • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE013F0EAF), ref: 00007FFE013F2774
                          • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FFE013F0EAF), ref: 00007FFE013F27B5
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.3548881477.00007FFE01331000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFE01330000, based on PE: true
                          • Associated: 00000003.00000002.3548847662.00007FFE01330000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3548979487.00007FFE01408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549037327.00007FFE0142B000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549067589.00007FFE0142C000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549091385.00007FFE0142E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000003.00000002.3549117367.00007FFE01430000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_7ffe01330000_rundll32.jbxd
                          Similarity
                          • API ID: ExceptionFileHeaderRaise
                          • String ID: csm
                          • API String ID: 2573137834-1018135373
                          • Opcode ID: 803400b020b35e7b7cee79a36dcbfeac4c00b13c1ec3e981fe52a929148dd7ad
                          • Instruction ID: 2f3c492ec71c5497c321c2b5a28b799690ae325ad0e7e1306ec4d2a1ab19701a
                          • Opcode Fuzzy Hash: 803400b020b35e7b7cee79a36dcbfeac4c00b13c1ec3e981fe52a929148dd7ad
                          • Instruction Fuzzy Hash: 12114F32A18B8182EB218F15F54026A77E5FB88B84F594238EF8C1B769DF3CD955CB00