Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TiNgny4xSB.dll

Overview

General Information

Sample name:TiNgny4xSB.dll
(renamed file extension from exe to dll, renamed because original name is a hash value)
Original sample name:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505.exe
Analysis ID:1576561
MD5:e5ec8b7cf88c66f78d607f76a2095fda
SHA1:fda7752c604ff7673ae31dc45a8f0a9dd0a3a6ac
SHA256:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505
Tags:94-232-40-41exeuser-JAMESWT_MHT
Infos:

Detection

BruteRatel
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Yara detected BruteRatel
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Creates a thread in another existing process (thread injection)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2124 cmdline: loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 5252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 1284 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 4940 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4248 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 4228 cmdline: C:\Windows\system32\WerFault.exe -u -p 4248 -s 496 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 2492 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 4092 cmdline: C:\Windows\system32\WerFault.exe -u -p 2492 -s 492 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7208 cmdline: rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops MD5: EF3179D498793BF4234F708D3BE28633)
      • WerFault.exe (PID: 7248 cmdline: C:\Windows\system32\WerFault.exe -u -p 7208 -s 488 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
    • rundll32.exe (PID: 7336 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7344 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7360 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7380 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7388 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7396 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7404 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7412 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7420 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7428 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7436 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7444 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7452 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7460 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7468 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7476 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7488 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7500 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7556 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7564 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7572 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7580 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7588 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7596 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7604 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7612 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7620 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewUserInterfaceSetting MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7628 cmdline: rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewGlobalSetting MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Brute Ratel C4, BruteRatelBrute Ratel C4 (BRC4) is a commercial framework for red-teaming and adversarial attack simulation, which made its first appearance in December 2020. It was specifically designed to evade detection by endpoint detection and response (EDR) and antivirus (AV) capabilities. BRC4 allows operators to deploy a backdoor agent known as Badger (aka BOLDBADGER) within a target environment.This agent enables arbitrary command execution, facilitating lateral movement, privilege escalation, and the establishment of additional persistence avenues. The Badger backdoor agent can communicate with a remote server via DNS over HTTPS, HTTP, HTTPS, SMB, and TCP, using custom encrypted channels. It supports a variety of backdoor commands including shell command execution, file transfers, file execution, and credential harvesting. Additionally, the Badger agent can perform tasks such as port scanning, screenshot capturing, and keystroke logging. Notably, in September 2022, a cracked version of Brute Ratel C4 was leaked in the cybercriminal underground, leading to its use by threat actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.brute_ratel_c4
No configs have been found
SourceRuleDescriptionAuthorStrings
00000015.00000002.3015117531.0000021809ECC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
    00000015.00000002.3020109408.000002180A014000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
      00000015.00000002.3015117531.0000021809F74000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
        Process Memory Space: rundll32.exe PID: 7412JoeSecurity_BruteRatel_1Yara detected BruteRatelJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results
          Source: TiNgny4xSB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: loaddll64.exe, 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2017241775.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.2063446205.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2038080623.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1894351341.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1892964336.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1904111570.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1892195591.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1910034546.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1909695071.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.3021072359.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1892719132.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1903209631.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.1909851161.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1905333875.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1889094484.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1893034192.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1883015462.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.1905882228.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.1910838284.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.1908677619.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1909988393.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.1910203790.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1907659400.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1892965927.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.1886313131.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.1910555538.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: loaddll64.exe, 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2017241775.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.2063446205.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2038080623.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1894351341.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1892964336.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1904111570.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1892195591.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1910034546.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1909695071.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.3021072359.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1892719132.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1903209631.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.1909851161.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1905333875.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1889094484.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1893034192.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1883015462.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.1905882228.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.1910838284.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.1908677619.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1909988393.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.1910203790.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1907659400.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1892965927.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.1886313131.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.1910555538.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50BD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FFDFB50BD20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB510B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FFDFB510B20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB510EC0 FindFirstFileW,FindClose,0_2_00007FFDFB510EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5044E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,0_2_00007FFDFB5044E5
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_04504176a318ef6a4711c8eb84999e6f6eb1_8f532422_fab5e15b-9538-4913-9e97-d15e50033763\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_916a7d8f75978f3384e540b6f642fd74f32736_8f532422_007882f3-b647-418e-b212-463ae2cad8a6\Jump to behavior

          Networking

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817
          Source: global trafficTCP traffic: 192.168.2.4:49741 -> 94.232.40.41:8817
          Source: global trafficTCP traffic: 192.168.2.4:49752 -> 94.232.46.11:8817
          Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
          Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: cronoze.com
          Source: global trafficDNS traffic detected: DNS query: muuxxu.com
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
          Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
          Source: rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com/
          Source: rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php
          Source: rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php#
          Source: rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php-%
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com/
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com/=k
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com/s
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php2k
          Source: rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php6h
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB506A10 GetSystemMetrics,GetAsyncKeyState,0_2_00007FFDFB506A10
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50D460 CreateMutexW,GetLastError,WaitForSingleObject,CreateProcessAsUserW,CloseHandle,CloseHandle,ReleaseMutex,CloseHandle,_invalid_parameter_noinfo_noreturn,RegSetValueExW,RegCloseKey,SendMessageW,RegQueryValueExW,RegCloseKey,0_2_00007FFDFB50D460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB547CA40_2_00007FFDFB547CA4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F3AC00_2_00007FFDFB4F3AC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB541AE40_2_00007FFDFB541AE4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5E59E00_2_00007FFDFB5E59E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5338880_2_00007FFDFB533888
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5CB8800_2_00007FFDFB5CB880
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4FF9200_2_00007FFDFB4FF920
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5038F00_2_00007FFDFB5038F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB503F900_2_00007FFDFB503F90
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB545EC00_2_00007FFDFB545EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB501F500_2_00007FFDFB501F50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB561D980_2_00007FFDFB561D98
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50BD200_2_00007FFDFB50BD20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5472480_2_00007FFDFB547248
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5CD1E00_2_00007FFDFB5CD1E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5111500_2_00007FFDFB511150
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5071500_2_00007FFDFB507150
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50F7B00_2_00007FFDFB50F7B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5497900_2_00007FFDFB549790
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5477200_2_00007FFDFB547720
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50B5B00_2_00007FFDFB50B5B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5475600_2_00007FFDFB547560
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50F5E00_2_00007FFDFB50F5E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50D4600_2_00007FFDFB50D460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB532BA00_2_00007FFDFB532BA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB55EB980_2_00007FFDFB55EB98
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB570C000_2_00007FFDFB570C00
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5D4AD00_2_00007FFDFB5D4AD0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB546B400_2_00007FFDFB546B40
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5469940_2_00007FFDFB546994
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F0A400_2_00007FFDFB4F0A40
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5469F40_2_00007FFDFB5469F4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB504ED00_2_00007FFDFB504ED0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB502E600_2_00007FFDFB502E60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4FEE500_2_00007FFDFB4FEE50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F4D300_2_00007FFDFB4F4D30
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5CECE00_2_00007FFDFB5CECE0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5AA3B00_2_00007FFDFB5AA3B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5C43800_2_00007FFDFB5C4380
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5CE4300_2_00007FFDFB5CE430
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5021B00_2_00007FFDFB5021B0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5D81E00_2_00007FFDFB5D81E0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4EE1100_2_00007FFDFB4EE110
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB54679C0_2_00007FFDFB54679C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5168000_2_00007FFDFB516800
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB51E67C0_2_00007FFDFB51E67C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50E7500_2_00007FFDFB50E750
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5604980_2_00007FFDFB560498
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5164600_2_00007FFDFB516460
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5004900_2_00007FFDFB500490
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5905000_2_00007FFDFB590500
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5044E50_2_00007FFDFB5044E5
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F85100_2_00007FFDFB4F8510
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004437C0_2_000000018004437C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800377880_2_0000000180037788
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002600C0_2_000000018002600C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002A01C0_2_000000018002A01C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800462C40_2_00000001800462C4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000A3140_2_000000018000A314
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800423EC0_2_00000001800423EC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001A47C0_2_000000018001A47C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800125500_2_0000000180012550
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003A5540_2_000000018003A554
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E7040_2_000000018003E704
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800167440_2_0000000180016744
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800147EC0_2_00000001800147EC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800268900_2_0000000180026890
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003A9040_2_000000018003A904
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800329B40_2_00000001800329B4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180042A100_2_0000000180042A10
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180008D6C0_2_0000000180008D6C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180032E140_2_0000000180032E14
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180048E5A0_2_0000000180048E5A
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180036E700_2_0000000180036E70
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180024F600_2_0000000180024F60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018000AF740_2_000000018000AF74
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800190200_2_0000000180019020
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800130780_2_0000000180013078
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003D08C0_2_000000018003D08C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800330A80_2_00000001800330A8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B1380_2_000000018001B138
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003713C0_2_000000018003713C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800332780_2_0000000180033278
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001F28C0_2_000000018001F28C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003B2940_2_000000018003B294
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800193F00_2_00000001800193F0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003B5080_2_000000018003B508
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018004363C0_2_000000018004363C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800176E40_2_00000001800176E4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800097A80_2_00000001800097A8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800197C00_2_00000001800197C0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800478340_2_0000000180047834
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800158A00_2_00000001800158A0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003D91C0_2_000000018003D91C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001B9240_2_000000018001B924
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800279B80_2_00000001800279B8
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180045A600_2_0000000180045A60
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018001FA9C0_2_000000018001FA9C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180013BA00_2_0000000180013BA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180029D900_2_0000000180029D90
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180015EA00_2_0000000180015EA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002FF500_2_000000018002FF50
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB911B4500_2_000001ABB911B450
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB913C4DC0_2_000001ABB913C4DC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB91135240_2_000001ABB9113524
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB910A77C0_2_000001ABB910A77C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB911A7940_2_000001ABB911A794
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB91157C00_2_000001ABB91157C0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB91439E40_2_000001ABB91439E4
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB91168740_2_000001ABB9116874
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000001ABB9114B740_2_000001ABB9114B74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004437C3_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800377883_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800147EC3_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002600C3_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002A01C3_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800190203_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800478343_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800130783_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003D08C3_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800268903_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800158A03_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800330A83_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003A9043_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003D91C3_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B9243_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001B1383_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003713C3_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800329B43_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800279B83_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180042A103_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180045A603_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800332783_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001F28C3_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003B2943_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001FA9C3_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800462C43_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000A3143_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180013BA03_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800193F03_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800423EC3_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018001A47C3_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003B5083_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800125503_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003A5543_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180008D6C3_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180029D903_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180032E143_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018004363C3_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180048E5A3_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180036E703_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180015EA03_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800176E43_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018003E7043_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800167443_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002FF503_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180024F603_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018000AF743_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800097A83_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_00000001800197C03_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D4B4503_2_0000023728D4B450
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D44B743_2_0000023728D44B74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D435243_2_0000023728D43524
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D39D403_2_0000023728D39D40
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D6C4DC3_2_0000023728D6C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D67E443_2_0000023728D67E44
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D5AD643_2_0000023728D5AD64
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D3BF483_2_0000023728D3BF48
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D46E743_2_0000023728D46E74
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D4404C3_2_0000023728D4404C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D5AFF03_2_0000023728D5AFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D56FE03_2_0000023728D56FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D457C03_2_0000023728D457C0
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D4A7943_2_0000023728D4A794
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D3A77C3_2_0000023728D3A77C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D468743_2_0000023728D46874
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D6E0603_2_0000023728D6E060
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D6407C3_2_0000023728D6407C
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D739E43_2_0000023728D739E4
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D3B2E83_2_0000023728D3B2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D6C2683_2_0000023728D6C268
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004437C4_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800377884_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800147EC4_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002600C4_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A01C4_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190204_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800478344_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800130784_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D08C4_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800268904_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800158A04_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800330A84_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A9044_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D91C4_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B9244_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B1384_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003713C4_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800329B44_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800279B84_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180042A104_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180045A604_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800332784_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F28C4_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B2944_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA9C4_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800462C44_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A3144_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013BA04_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800193F04_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800423EC4_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A47C4_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B5084_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125504_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A5544_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D6C4_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029D904_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032E144_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004363C4_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048E5A4_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036E704_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015EA04_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176E44_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003E7044_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800167444_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002FF504_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024F604_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AF744_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097A84_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197C04_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F78C2684_2_000002BD9F78C268
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F75B2E84_2_000002BD9F75B2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F7939E44_2_000002BD9F7939E4
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F7668744_2_000002BD9F766874
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F78407C4_2_000002BD9F78407C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F78E0604_2_000002BD9F78E060
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F76404C4_2_000002BD9F76404C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F76A7944_2_000002BD9F76A794
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F75A77C4_2_000002BD9F75A77C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F75BF484_2_000002BD9F75BF48
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F77AFF04_2_000002BD9F77AFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F776FE04_2_000002BD9F776FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F7657C04_2_000002BD9F7657C0
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F766E744_2_000002BD9F766E74
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F787E444_2_000002BD9F787E44
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F77AD644_2_000002BD9F77AD64
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F759D404_2_000002BD9F759D40
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F7635244_2_000002BD9F763524
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F76B4504_2_000002BD9F76B450
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F78C4DC4_2_000002BD9F78C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F764B744_2_000002BD9F764B74
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004437C8_2_000000018004437C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800377888_2_0000000180037788
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800147EC8_2_00000001800147EC
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002600C8_2_000000018002600C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002A01C8_2_000000018002A01C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800190208_2_0000000180019020
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800478348_2_0000000180047834
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800130788_2_0000000180013078
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003D08C8_2_000000018003D08C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800268908_2_0000000180026890
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800158A08_2_00000001800158A0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800330A88_2_00000001800330A8
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003A9048_2_000000018003A904
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003D91C8_2_000000018003D91C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001B9248_2_000000018001B924
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001B1388_2_000000018001B138
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003713C8_2_000000018003713C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800329B48_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800279B88_2_00000001800279B8
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180042A108_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180045A608_2_0000000180045A60
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800332788_2_0000000180033278
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001F28C8_2_000000018001F28C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003B2948_2_000000018003B294
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001FA9C8_2_000000018001FA9C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800462C48_2_00000001800462C4
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018000A3148_2_000000018000A314
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180013BA08_2_0000000180013BA0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800193F08_2_00000001800193F0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800423EC8_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018001A47C8_2_000000018001A47C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003B5088_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800125508_2_0000000180012550
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003A5548_2_000000018003A554
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180008D6C8_2_0000000180008D6C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180029D908_2_0000000180029D90
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180032E148_2_0000000180032E14
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018004363C8_2_000000018004363C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180048E5A8_2_0000000180048E5A
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180036E708_2_0000000180036E70
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180015EA08_2_0000000180015EA0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800176E48_2_00000001800176E4
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018003E7048_2_000000018003E704
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800167448_2_0000000180016744
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002FF508_2_000000018002FF50
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180024F608_2_0000000180024F60
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018000AF748_2_000000018000AF74
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800097A88_2_00000001800097A8
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_00000001800197C08_2_00000001800197C0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD768748_2_000002754DD76874
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD9E0608_2_000002754DD9E060
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD9407C8_2_000002754DD9407C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD7404C8_2_000002754DD7404C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD8AFF08_2_000002754DD8AFF0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD86FE08_2_000002754DD86FE0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD74B748_2_000002754DD74B74
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD6B2E88_2_000002754DD6B2E8
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD9C2688_2_000002754DD9C268
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DDA39E48_2_000002754DDA39E4
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD8AD648_2_000002754DD8AD64
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD735248_2_000002754DD73524
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD69D408_2_000002754DD69D40
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD9C4DC8_2_000002754DD9C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD7B4508_2_000002754DD7B450
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD757C08_2_000002754DD757C0
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD7A7948_2_000002754DD7A794
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD6A77C8_2_000002754DD6A77C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD6BF488_2_000002754DD6BF48
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD76E748_2_000002754DD76E74
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD97E448_2_000002754DD97E44
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180007B54 appears 51 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180007B1C appears 114 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018002CC54 appears 117 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800389F4 appears 48 times
          Source: C:\Windows\System32\rundll32.exeCode function: String function: 00000001800020F0 appears 42 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 000000018002CC54 appears 39 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 0000000180007B1C appears 38 times
          Source: C:\Windows\System32\loaddll64.exeCode function: String function: 00007FFDFB507E10 appears 61 times
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4248 -s 496
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSES.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSAR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSZHT.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSCS.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSDE.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSEL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenamenView.dllf# vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSFI.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSFR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSHE.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSHU.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSIT.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSJA.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSKO.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSNL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSNO.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPTB.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSRU.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSK.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSV.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSTH.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSTR.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSUK.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSSL.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSZHC.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSDA.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSESM.dllV vs TiNgny4xSB.dll
          Source: TiNgny4xSB.dllBinary or memory string: OriginalFilenameNVWRSPT.dllV vs TiNgny4xSB.dll
          Source: classification engineClassification label: mal88.troj.evad.winDLL@122/14@3/2
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB507720 GetLastError,FormatMessageW,LocalFree,0_2_00007FFDFB507720
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5D3010 CoInitialize,CoCreateInstance,0_2_00007FFDFB5D3010
          Source: C:\Windows\System32\rundll32.exeFile created: C:\Users\user\NTUSER.DAT.NotJump to behavior
          Source: C:\Windows\System32\rundll32.exeMutant created: NULL
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2492
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5252:120:WilError_03
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4248
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7208
          Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\c7bee0ff-5da8-48a8-9d52-cd3a1b231709Jump to behavior
          Source: TiNgny4xSB.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
          Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll"
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4248 -s 496
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 2492 -s 492
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops
          Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7208 -s 488
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewUserInterfaceSetting
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewGlobalSetting
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktopJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfosJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopsJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktopJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfosJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopsJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecuteJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnloadJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotifyJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHookJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmdJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWNDJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSettingJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdateJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSaveJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLockJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadExJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadAppJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImportJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoExJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectoryJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfileJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnumJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDeleteJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewUserInterfaceSettingJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewGlobalSettingJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\loaddll64.exeProcess created: unknown unknownJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: TiNgny4xSB.dllStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: TiNgny4xSB.dllStatic PE information: Image base 0x180000000 > 0x60000000
          Source: TiNgny4xSB.dllStatic file information: File size 3112960 > 1048576
          Source: TiNgny4xSB.dllStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x16ea00
          Source: TiNgny4xSB.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x111800
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: TiNgny4xSB.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: TiNgny4xSB.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: loaddll64.exe, 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2017241775.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.2063446205.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2038080623.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1894351341.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1892964336.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1904111570.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1892195591.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1910034546.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1909695071.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.3021072359.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1892719132.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1903209631.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.1909851161.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1905333875.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1889094484.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1893034192.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1883015462.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.1905882228.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.1910838284.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.1908677619.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1909988393.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.1910203790.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1907659400.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1892965927.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.1886313131.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.1910555538.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: loaddll64.exe, 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000003.00000002.2017241775.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000008.00000002.2063446205.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000B.00000002.2038080623.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000E.00000002.1894351341.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000000F.00000002.1892964336.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000010.00000002.1904111570.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000011.00000002.1892195591.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000012.00000002.1910034546.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000014.00000002.1909695071.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000015.00000002.3021072359.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000016.00000002.1892719132.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000017.00000002.1903209631.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000018.00000002.1909851161.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000019.00000002.1905333875.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001A.00000002.1889094484.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001B.00000002.1893034192.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001C.00000002.1883015462.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001D.00000002.1905882228.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001E.00000002.1910838284.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 0000001F.00000002.1908677619.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000021.00000002.1909988393.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000022.00000002.1910203790.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000023.00000002.1907659400.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000024.00000002.1892965927.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000025.00000002.1886313131.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, rundll32.exe, 00000027.00000002.1910555538.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmp, TiNgny4xSB.dll
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: TiNgny4xSB.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5EAC30 LoadLibraryW,GetProcAddress,MonitorFromPoint,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,GetDC,GetDeviceCaps,ReleaseDC,0_2_00007FFDFB5EAC30
          Source: TiNgny4xSB.dllStatic PE information: real checksum: 0x259992 should be: 0x2f8529
          Source: TiNgny4xSB.dllStatic PE information: section name: _RDATA
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018002CF10 push rsp; iretd 0_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_000000018002CF10 push rsp; iretd 3_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000023728D48D98 push ebp; iretd 3_2_0000023728D48D9C
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002CF10 push rsp; iretd 4_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000002BD9F768D98 push ebp; iretd 4_2_000002BD9F768D9C
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000000018002CF10 push rsp; iretd 8_2_000000018002CF11
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000002754DD78D98 push ebp; iretd 8_2_000002754DD78D9C
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50E750 MessageBoxW,lstrlenW,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetForegroundWindow,PostMessageW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendMessageW,0_2_00007FFDFB50E750
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00000001800329B4 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00000001800329B4
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\System32\loaddll64.exeCode function: GetCurrentProcessId,GetCommandLineW,GetModuleFileNameW,CharLowerW,GetCommandLineW,CommandLineToArgvW,LocalFree,StrStrIW,GetFileVersionInfoSizeW,GetFileVersionInfoW,VerQueryValueW,_invalid_parameter_noinfo_noreturn,StrStrIW,0_2_00007FFDFB504ED0
          Source: C:\Windows\System32\loaddll64.exeAPI coverage: 1.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 6.5 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 7.6 %
          Source: C:\Windows\System32\rundll32.exeAPI coverage: 6.5 %
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB50BD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FFDFB50BD20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB510B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FFDFB510B20
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB510EC0 FindFirstFileW,FindClose,0_2_00007FFDFB510EC0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5044E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,0_2_00007FFDFB5044E5
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4EDE40 GetSystemInfo,MapViewOfFileEx,RegisterWindowMessageW,CloseHandle,CloseHandle,0_2_00007FFDFB4EDE40
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_04504176a318ef6a4711c8eb84999e6f6eb1_8f532422_fab5e15b-9538-4913-9e97-d15e50033763\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\Jump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueueJump to behavior
          Source: C:\Windows\System32\WerFault.exeFile opened: C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_TiN_916a7d8f75978f3384e540b6f642fd74f32736_8f532422_007882f3-b647-418e-b212-463ae2cad8a6\Jump to behavior
          Source: Amcache.hve.7.drBinary or memory string: VMware
          Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
          Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
          Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
          Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
          Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
          Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
          Source: rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.0000021806448000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
          Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
          Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
          Source: Amcache.hve.7.drBinary or memory string: vmci.sys
          Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
          Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
          Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
          Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
          Source: Amcache.hve.7.drBinary or memory string: VMware20,1
          Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
          Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
          Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
          Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
          Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
          Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
          Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
          Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
          Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
          Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-94119
          Source: C:\Windows\System32\loaddll64.exeAPI call chain: ExitProcess graph end nodegraph_0-94272
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end node
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\rundll32.exeProcess queried: DebugPort
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB58BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FFDFB58BAA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003EEEC EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_000000018003EEEC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB5EAC30 LoadLibraryW,GetProcAddress,MonitorFromPoint,FreeLibrary,LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,GetDC,GetDeviceCaps,ReleaseDC,0_2_00007FFDFB5EAC30
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180036780 GetProcessHeap,0_2_0000000180036780
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB58BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FFDFB58BAA0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000000180032DD8
          Source: C:\Windows\System32\rundll32.exeCode function: 8_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0000000180032DD8

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817
          Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817
          Source: C:\Windows\System32\rundll32.exeMemory allocated: C:\Windows\explorer.exe base: 13B0000 protect: page execute and read and write
          Source: C:\Windows\System32\rundll32.exeThread created: unknown EIP: 13B0000
          Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 13B0000 value starts with: 4D5A
          Source: C:\Windows\System32\rundll32.exeMemory written: PID: 2580 base: 13B0000 value: 4D
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7208
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7208
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7208
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7208
          Source: C:\Windows\System32\rundll32.exeThread register set: target process: 7208
          Source: C:\Windows\System32\rundll32.exeThread register set: 7208 1
          Source: C:\Windows\System32\rundll32.exeMemory written: C:\Windows\explorer.exe base: 13B0000
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1Jump to behavior
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F04D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,0_2_00007FFDFB4F04D0
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB4F04D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,0_2_00007FFDFB4F04D0
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoEx,0_2_00007FFDFB545624
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,0_2_00000001800354AC
          Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,0_2_00000001800400E0
          Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,0_2_000000018002E394
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,0_2_00000001800423EC
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,0_2_00000001800384A0
          Source: C:\Windows\System32\loaddll64.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,0_2_000000018004064C
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,0_2_0000000180042858
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,0_2_000000018004290C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,0_2_0000000180042A10
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000000180042D88
          Source: C:\Windows\System32\loaddll64.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,0_2_0000000180040DB0
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,EnumSystemLocalesW,0_2_0000000180042E3C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,0_2_0000000180042ED0
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,0_2_0000000180043100
          Source: C:\Windows\System32\loaddll64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_000000018004324C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,GetLocaleInfoW,0_2_00000001800432FC
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,0_2_00000001800433A4
          Source: C:\Windows\System32\loaddll64.exeCode function: EnumSystemLocalesW,0_2_00000001800353EC
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_000000018003B508
          Source: C:\Windows\System32\loaddll64.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,0_2_00000001800298D8
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,0_2_00000001800419E8
          Source: C:\Windows\System32\loaddll64.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_0000000180041B54
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,0_2_000001ABB913C4DC
          Source: C:\Windows\System32\loaddll64.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,0_2_000001ABB914382C
          Source: C:\Windows\System32\loaddll64.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,0_2_000001ABB91439E4
          Source: C:\Windows\System32\loaddll64.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,0_2_000001ABB912A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,3_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,3_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,3_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,3_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,3_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,3_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,3_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,3_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,3_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,3_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,3_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,3_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,3_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,3_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,3_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,3_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,3_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,3_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,3_2_0000023728D6C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,3_2_0000023728D7382C
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,3_2_0000023728D5A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,3_2_0000023728D739E4
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,4_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,4_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,4_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,4_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,4_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,4_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,4_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,4_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,4_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,4_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,4_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,4_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,4_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,4_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,4_2_000002BD9F7939E4
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,4_2_000002BD9F79382C
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_000002BD9F77A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,4_2_000002BD9F78C4DC
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,8_2_00000001800354AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,8_2_0000000180042858
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,8_2_00000001800298D8
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,8_2_00000001800400E0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,8_2_0000000180043100
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,8_2_000000018004290C
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,8_2_00000001800419E8
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,8_2_0000000180042A10
          Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_000000018004324C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,8_2_00000001800432FC
          Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,8_2_0000000180041B54
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,8_2_000000018002E394
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,8_2_00000001800433A4
          Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,8_2_00000001800353EC
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,8_2_00000001800423EC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,8_2_00000001800384A0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,8_2_000000018003B508
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,8_2_0000000180042D88
          Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,8_2_0000000180040DB0
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,8_2_0000000180042E3C
          Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,8_2_000000018004064C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,8_2_0000000180042ED0
          Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,8_2_000002754DD8A8AC
          Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,8_2_000002754DDA382C
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_getptd,_getptd,LcidFromHexString,8_2_000002754DDA39E4
          Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,8_2_000002754DD9C4DC
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_0000000180039844 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0000000180039844
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_000000018003E704 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_000000018003E704
          Source: C:\Windows\System32\loaddll64.exeCode function: 0_2_00007FFDFB506A40 GetModuleHandleA,GetProcAddress,GetVersionExW,0_2_00007FFDFB506A40
          Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
          Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000015.00000002.3015117531.0000021809ECC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.3020109408.000002180A014000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.3015117531.0000021809F74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000015.00000002.3015117531.0000021809ECC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.3020109408.000002180A014000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.3015117531.0000021809F74000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7412, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire Infrastructure1
          Valid Accounts
          1
          Native API
          1
          Valid Accounts
          1
          Valid Accounts
          1
          Masquerading
          11
          Input Capture
          2
          System Time Discovery
          Remote Services11
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Access Token Manipulation
          1
          Valid Accounts
          LSASS Memory151
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)811
          Process Injection
          1
          Access Token Manipulation
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          1
          Virtualization/Sandbox Evasion
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script811
          Process Injection
          LSA Secrets2
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain Credentials14
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Rundll32
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576561 Sample: TiNgny4xSB.exe Startdate: 17/12/2024 Architecture: WINDOWS Score: 88 29 muuxxu.com 2->29 31 cronoze.com 2->31 37 Yara detected BruteRatel 2->37 8 loaddll64.exe 2 2->8         started        signatures3 process4 signatures5 39 Contains functionality to compare user and computer (likely to detect sandboxes) 8->39 11 rundll32.exe 8->11         started        15 rundll32.exe 1 8->15         started        17 rundll32.exe 1 8->17         started        19 30 other processes 8->19 process6 dnsIp7 33 cronoze.com 94.232.40.41, 49741, 8817 WELLWEBNL Russian Federation 11->33 35 muuxxu.com 94.232.46.11, 49752, 8817 WELLWEBNL Russian Federation 11->35 41 System process connects to network (likely due to code injection or exploit) 11->41 43 Injects code into the Windows Explorer (explorer.exe) 11->43 45 Sets debug register (to hijack the execution of another thread) 11->45 47 5 other signatures 11->47 21 WerFault.exe 16 15->21         started        23 WerFault.exe 16 17->23         started        25 WerFault.exe 20 16 19->25         started        27 rundll32.exe 2 19->27         started        signatures8 process9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          TiNgny4xSB.dll3%VirustotalBrowse
          TiNgny4xSB.dll5%ReversingLabsWin64.Trojan.Seheq
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          muuxxu.com1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://cronoze.com/0%Avira URL Cloudsafe
          https://muuxxu.com:8817/pentium.php6h0%Avira URL Cloudsafe
          https://muuxxu.com/0%Avira URL Cloudsafe
          https://muuxxu.com:8817/pentium.php0%Avira URL Cloudsafe
          http://r11.o.lencr.org0#0%Avira URL Cloudsafe
          https://muuxxu.com/1%VirustotalBrowse
          https://cronoze.com:8817/pentium.php-%0%Avira URL Cloudsafe
          https://muuxxu.com/=k0%Avira URL Cloudsafe
          https://muuxxu.com/s0%Avira URL Cloudsafe
          https://cronoze.com:8817/pentium.php0%Avira URL Cloudsafe
          https://cronoze.com:8817/pentium.php#0%Avira URL Cloudsafe
          https://muuxxu.com:8817/pentium.php2k0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          cronoze.com
          94.232.40.41
          truetrue
            unknown
            muuxxu.com
            94.232.46.11
            truetrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://muuxxu.com:8817/pentium.php6hrundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://muuxxu.com/rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://r11.o.lencr.org0#rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://cronoze.com/rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://muuxxu.com:8817/pentium.phprundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://x1.c.lencr.org/0rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              http://x1.i.lencr.org/0rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://cronoze.com:8817/pentium.php-%rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://muuxxu.com/=krundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://upx.sf.netAmcache.hve.7.drfalse
                  high
                  https://cronoze.com:8817/pentium.phprundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://muuxxu.com/srundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://cronoze.com:8817/pentium.php#rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://muuxxu.com:8817/pentium.php2krundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://r11.i.lencr.org/0rundll32.exe, 00000015.00000003.2784582353.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806423000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.0000021806457000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000003.2784582353.000002180642B000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000015.00000002.3010242416.00000218063C8000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    94.232.46.11
                    muuxxu.comRussian Federation
                    44477WELLWEBNLtrue
                    94.232.40.41
                    cronoze.comRussian Federation
                    44477WELLWEBNLtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1576561
                    Start date and time:2024-12-17 09:18:06 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 4s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:42
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:TiNgny4xSB.dll
                    (renamed file extension from exe to dll, renamed because original name is a hash value)
                    Original Sample Name:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505.exe
                    Detection:MAL
                    Classification:mal88.troj.evad.winDLL@122/14@3/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 4
                    • Number of non-executed functions: 117
                    • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.177.20, 20.109.210.53, 13.107.246.63
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report creation exceeded maximum time and may have missing disassembly code information.
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    03:19:31API Interceptor3x Sleep call for process: WerFault.exe modified
                    03:21:09API Interceptor1x Sleep call for process: loaddll64.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    WELLWEBNLavutil.dll.dllGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.224
                    fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    merd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.213
                    81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                    • 94.232.45.36
                    WELLWEBNLavutil.dll.dllGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.224
                    fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                    • 94.232.43.224
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    merd.msiGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    sqx.dll.dllGet hashmaliciousUnknownBrowse
                    • 94.232.40.38
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    mesh.exeGet hashmaliciousMeshAgentBrowse
                    • 94.232.43.185
                    Document-19-06-38.jsGet hashmaliciousBruteRatelBrowse
                    • 94.232.43.213
                    81zBpBAWwc.exeGet hashmaliciousRHADAMANTHYSBrowse
                    • 94.232.45.36
                    No context
                    No context
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8199633474791661
                    Encrypted:false
                    SSDEEP:96:WW1wFIB/iFyKy6Zsj+4Rvd+qzfxbQXIDcQ/c65kcEqcw3kXaXz+HbHgSQgJjZEwd:eSZiFy6Z220R9kweju/zuiFKZ24lO8F
                    MD5:B998EEE39E3243D31ED51347412D5EE8
                    SHA1:4FE7B60036F9155C89D6E9F17C8E3AB58FDAF08C
                    SHA-256:E53A342A97CB1339505A92FDB1816F14091FA24A63574F7BD616E7742A650463
                    SHA-512:6C9C62CDE175CD356A994AC7852FF74EBEA2A94932B12AFA4237310CBB25FF7E41ECC9B77DF0586F3919E4CED02701CD2D19CBB62CF585FDAEA30D11B3701977
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.7.1.2.9.8.8.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.7.4.4.2.3.8.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.b.5.e.1.5.b.-.9.5.3.8.-.4.9.1.3.-.9.e.9.7.-.d.1.5.e.5.0.0.3.3.7.6.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.8.1.3.f.c.c.-.e.c.d.c.-.4.2.5.1.-.9.2.7.4.-.9.5.d.6.c.7.1.c.c.d.2.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.2.8.-.0.0.0.1.-.0.0.1.4.-.2.3.6.a.-.2.d.5.7.5.c.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8198373733028722
                    Encrypted:false
                    SSDEEP:96:WB1aMF/H/imyKyjsj+4Rvd+qzfzQXIDcQCc6qPcEDcw3W2RXaXz+HbHgSQgJjZE6:09fimyj2408wJi2Zju/zuiFKZ24lO8F
                    MD5:BD51C2A5E1C70C8E7D84FF402DEDC962
                    SHA1:9089F9250FE97965FFCE396BC94C4070555A6422
                    SHA-256:0AEFD1F268AC601D51CD582A9F6FB0EAAB32ABFCADBD93CD93A58291BC13DBAB
                    SHA-512:BBD6EFA62AEF17EBC7AB8324EAC3D82B71E9DEBD74470F86F0E4B9DEEC6C70165913BE2E1CB7028C593307FD5E0F200CAF09BB0896F6B4C7A34F071D7BF7ADD9
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.4.1.5.8.4.4.0.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.4.4.7.0.9.4.4.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.0.5.9.0.b.a.-.8.6.b.0.-.4.e.b.5.-.b.e.0.5.-.e.3.4.1.e.d.5.6.4.e.f.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.e.5.5.6.e.6.d.-.4.d.e.1.-.4.f.8.9.-.b.1.2.2.-.0.4.2.a.7.9.f.b.6.2.6.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.b.c.-.0.0.0.1.-.0.0.1.4.-.b.a.4.9.-.6.1.5.5.5.c.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.8199016948784835
                    Encrypted:false
                    SSDEEP:96:W21MSFiW/ilyKyFsj+4Rvd+qzfWQXIDcQ/c65kcE/cw3zXaXz+HbHgSQgJjZEwIS:PoeilyF210R9k1/j2/zuiFKZ24lO8F
                    MD5:C2AA9D5043983CCBCBA9BF8B6AFD1DB2
                    SHA1:F55387EE402B635467602F7B72309A8739DEE4DF
                    SHA-256:39CB3626E219683EFD48872652A1F9EDE029CA9EE44AEDD4C5F5CE15976869A2
                    SHA-512:A9BE40373721F3B9247835A1600D428EFA859C978F3B3805406DC5480016F633AA51D47436A50CF69895FBC34B1193F7DDF1A19F454D9CE52B3810CBB04733F5
                    Malicious:false
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.1.5.5.8.3.7.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.8.8.9.7.1.4.1.9.9.5.8.7.0.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.0.7.8.8.2.f.3.-.b.6.4.7.-.4.1.8.e.-.b.2.1.2.-.4.6.3.a.e.2.c.a.d.8.a.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.e.4.7.4.1.d.3.-.3.2.6.6.-.4.a.1.b.-.9.a.2.d.-.8.e.4.6.3.3.b.5.7.5.b.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e._.T.i.N.g.n.y.4.x.S.B...d.l.l.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.9.8.-.0.0.0.1.-.0.0.1.4.-.d.e.1.a.-.9.4.5.3.5.c.5.0.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.d.d.3.9.9.a.e.4.6.3.0.3.3.4.3.f.9.f.0.d.a.1.8.9.a.e.e.1.1.c.6.7.b.d.8.6.8.2.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:19:04 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):70140
                    Entropy (8bit):1.5505234966254222
                    Encrypted:false
                    SSDEEP:192:HZUdngtJX/cQ5e2OMQpbRQcNw9b0Y2QguP/ByIn3vanl:5qgtxZ5eBZpbyc0bJ2QgAyI3Sl
                    MD5:6C12DDE9A1AADE462645B8D81B6E3307
                    SHA1:E503F8EA06962C27A8404A7EE19941840EAA6B2E
                    SHA-256:EB806686649C21C7D618E15F907DB0D4F56F463A9E634D70F47EC2BD6C80801C
                    SHA-512:B6C5DBEA6CAF90EF97B896F048FE9D92D3E7AE25A47F867A1C136F70E3560FCB325A03BDF135CEA9789A3495D9F04DEE19AFD836C5F762F143D863EF80AC1EFE
                    Malicious:false
                    Preview:MDMP..a..... ........3ag....................................$...f2..........T.......8...........T...............d...........x...........d...............................................................................eJ..............Lw......................T............3ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8540
                    Entropy (8bit):3.699969234720502
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJQMpUH6YElLjIgmfGYd2YdWprv89b3cpfHdm:R6lXJ7pO6YqMgmfGYd203Kfg
                    MD5:0606A38D38AEEB0B03DBA6AB8421004D
                    SHA1:335496349DAD613F24470DBBCB0C6651B5A089A9
                    SHA-256:7FF574004EBF4B2DFFC56440782EAEF6F9F5C1A3413CC324ECD586108D156E4C
                    SHA-512:9580A159673331C79191AB575319E37CA643F1D11F45B469C78CDD4B104DA4D13DBF1BC5A86256F748404F4950C0D7C2561B641D3345799A26ABE870CCB27721
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.4.9.2.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.50087969172379
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsDJg771I97QWpW8VYiYm8M4JCWOCWcXQfFlaFWkyq85mWOKsfpzptSTX:uIjfdI7op7VWJKwpbpzpoOid
                    MD5:D41CB9F91CA7CF8147D6E1D7DF83E368
                    SHA1:D30FE1D70FB6E46274211BF49645A3B26284100D
                    SHA-256:6298999FC81718028A201173B9FCBE4BBEDD2F20E687BE708267A92368F43D18
                    SHA-512:1C3271556A38CFD5379EA6AC77AB67EB60836936589A8E99ACF60C4A5AF90B80B636BC48F1E53369D63B252E15B73970B6EC8D5D20431744ED9373254BBF461E
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635001" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:19:07 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):71052
                    Entropy (8bit):1.5380467441173178
                    Encrypted:false
                    SSDEEP:96:5p8Iscd+YYUpyGHA5Ks5JX5Ofs2bX5NTUoi7MxCRW9ByEsnwCzICbqn8g0eIxahG:0angtJX/2OMX9knwaIP8+ITuhfQC
                    MD5:3FE17FCF8AADC364685BE389099BEE6B
                    SHA1:7D704919F85F399307A20C3AB2A4531E4D026D14
                    SHA-256:30CF03B98D49D9B7B221C746D9B6EC7348601F51B9F1DFE349B6F89C60AED772
                    SHA-512:DC172DC008E503755755CFECCC18864AC3F4BAF4AF06610AFA347F258246A380C67DB2C3BE378B7468D34140C54D58644EA1BF3D48E54C0A1C8E532FFC7965E2
                    Malicious:false
                    Preview:MDMP..a..... ........3ag....................................$...f2..........T.......8...........T...........................x...........d...............................................................................eJ..............Lw......................T.......(....3ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8540
                    Entropy (8bit):3.7008360849875857
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJA5p76YEUjIgmfGivMdWprv89bWb7pfeQjm:R6lXJOp76Y/MgmfGivYWb1f96
                    MD5:1FA1482BC32D8BD8C3F655B9263896F5
                    SHA1:EEC5A01C4A9F030A4FECC15E0183592F23EDDDDC
                    SHA-256:29536D21B9ACBD134031161E065E5BF1965928CC1ED1BB916D0184A498B9F802
                    SHA-512:4611C9C00188129C2AF3DC073A29A519CB8278000C556019C47688D5B14A812DA9EC63CB8199CADD5960E9ACF653C9A7405A819695C37FE14331D9030D140B05
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.0.8.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.4998530693465275
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsDJg771I97QWpW8VYMYm8M4JCWOCWcXQNF4hyq85mWOKsvsptSTSBd:uIjfdI7op7VUJ9wpoOBd
                    MD5:10E9508D549D58431AB282003C8A609A
                    SHA1:06594766CDC3716733D7C16DE01EA4B2A2E89902
                    SHA-256:979A987BA7106F30CB1F136DF585F872D5BEDE2C7C85822112D5B7E336151B95
                    SHA-512:71DE9EDBE54218B9C56E6C5CF8FEF8A65037AB68B4483D55D2E885C386DAB4B144485A23C3A47EE2430563D7A867853D7CBCFEDCA08EFFC461FF3D954B3663B9
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635001" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Tue Dec 17 08:19:01 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):57212
                    Entropy (8bit):1.722216239103984
                    Encrypted:false
                    SSDEEP:192:W4YtVXvtcFiOMwJMEQwJPHvbviEhPfXznc:DoxWF9jP7Hvbv1hPfXzc
                    MD5:6FBBF3242B08D6FA14DA725982CD8BC9
                    SHA1:1FD0488DD9FA215E045F20B12995587086DB4FDF
                    SHA-256:117A2EF4292B18BD6A1A2EEE84A33F09F9D5B6415E8B941749919A4FFA98C536
                    SHA-512:DE469A30D3EF29A64128F0904DE235C66CAEBCF5DAB3E9429429147485E5D9ADB30C0BD570B388FF068920AFE47B23678168887CEFBEA0E765E3645B94BC51A4
                    Malicious:false
                    Preview:MDMP..a..... ........3ag........................................f-..........T.......8...........T...........................H...........4...............................................................................eJ..............Lw......................T............3ag.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8542
                    Entropy (8bit):3.6975660852245094
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJ3j4SUA6YEJjIgmfGPv6dWprT89bKlpf5Om:R6lXJzLj6YiMgmfGPvWK7f5
                    MD5:7092857F38660899F4434D2117CDEABB
                    SHA1:034BFC7F26CB7700A8ADDAE0309DFC7B9EC56798
                    SHA-256:C205D258E41A64714B35BED96BC37C5D8F78BF93A78347065CA8709C995121DB
                    SHA-512:8F34D7F374F65AB8C84CC529B2FDDEA7F7AEA0039670D83FC1929E72433FB39C63EC165336C9A9AB42F2B3CC6F79282CA5358B7A4CAF92F4D81F8584627A6B59
                    Malicious:false
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.4.8.<./.P.i.
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4765
                    Entropy (8bit):4.499172861037348
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsDJg771I97QWpW8VY5Ym8M4JCWOCWcXQYFM0syq85mWOKsw2ptSTSgd:uIjfdI7op7VFJdsdpoOgd
                    MD5:B2A08A486D113A936A5A20116D24E779
                    SHA1:3B347CD355EDED8BF8F8347E5CD9036A37DA50AD
                    SHA-256:64F9FBEEA0C38B2B5DCB22061C66A7D8D3A6A7A74430812554E674EA8DAE2FCE
                    SHA-512:CA20D87CEC4826B230ECF1CBDDCAE2028E355332AE4982FFC277276FCBA870E11408AE025F02E7D103811BD8C554CF77DCF90FE0DDF5259B7AD6B31FA42AE5C0
                    Malicious:false
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="635001" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\System32\rundll32.exe
                    File Type:ASCII text, with no line terminators
                    Category:dropped
                    Size (bytes):96
                    Entropy (8bit):5.081027121086312
                    Encrypted:false
                    SSDEEP:3:V+Q+50RFazdRVg3qRJmEXQ+50RHcypPV:hOU4Jg6RJmEAO8cQt
                    MD5:6DD68261A78C264108E3252416D4DC81
                    SHA1:9B975E9012962C1D2F17F0B08A4504074EBF8D40
                    SHA-256:03CE7C591C8953B13FBCE8C1D3FF2F32557D1311A5D1CE2AF639A8FDB5E96E33
                    SHA-512:11AA9A5266EC80B9F6E9EC41B783F52888876BBC0D3B1647E3813AB20FE04B870A159884AE77D12B578C5C2CD4BADE72D6AFBF2B0C7BC0CCC035758734105468
                    Malicious:false
                    Preview:{VGlOZ255NHhTQi5kbGw=, IkM6XFVzZXJzXGpvbmVzXERlc2t0b3BcVGlOZ255NHhTQi5kbGwi, MQ==, blZpZXdDbWQ=}
                    Process:C:\Windows\System32\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.466353220432204
                    Encrypted:false
                    SSDEEP:6144:xIXfpi67eLPU9skLmb0b4zWSPKaJG8nAgejZMMhA2gX4WABl0uNcdwBCswSb9:SXD94zWlLZMM6YFHa+9
                    MD5:39705718317F23573C4A2D66CE03DCAE
                    SHA1:99FD63C0590EE4D864C435C554187389F5FC1F88
                    SHA-256:1A8B79102101187C1622D31BD45CE588E439527F31FBE373CE3FC9F8B9C40B12
                    SHA-512:A2F04330B406DB226F38D4475F4391CB64A2B10BA40CC5A6D06B14961B2AFDA691A6949839776A537B592BFFB72C82E79C4C55C9A5103AB64E7BF21741639370
                    Malicious:false
                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...T\P...............................................................................................................................................................................................................................................................................................................................................{.`........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                    Entropy (8bit):7.017969386306067
                    TrID:
                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                    • Win64 Executable (generic) (12005/4) 10.17%
                    • Generic Win/DOS Executable (2004/3) 1.70%
                    • DOS Executable Generic (2002/1) 1.70%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                    File name:TiNgny4xSB.dll
                    File size:3'112'960 bytes
                    MD5:e5ec8b7cf88c66f78d607f76a2095fda
                    SHA1:fda7752c604ff7673ae31dc45a8f0a9dd0a3a6ac
                    SHA256:1552c43ecf6eeb5e2fe13cc1c25e6bdacf227222afaa9a523d996b6331945505
                    SHA512:80ddbef4e3e8912b15b2a41a9416041159c305dd24d5e06c62008708e8cf4c307981ce0c96690b9b1fb7dc72634c3f172993ab73b82ac53cce9995b64addb1d3
                    SSDEEP:49152:1x4R6f1w6HKPwqliTUERW+e46IwdKMmMxSp:1+R+wlPwHgEofIwRmyS
                    TLSH:7AE56D827AD72200F1EBE138C9725709C1BA74550B31D5CF46740BBA3A8B7F59A7B392
                    File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........xUis+Uis+Uis+..p*_is+..v*.is+3..+Tis+..w*Dis+..p*_is+..v*.is+..z*]is+..w*@is+\..+Wis+\..+Tis+..r*Bis+Uir+.hs+..v*~is+..s*Tis
                    Icon Hash:d2aab9d2faeece37
                    Entrypoint:0x1800c6224
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x180000000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x66CD0BFB [Mon Aug 26 23:12:59 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:3f2962bd80009d147ddac59f9c2b8d66
                    Signature Valid:
                    Signature Issuer:
                    Signature Validation Error:
                    Error Number:
                    Not Before, Not After
                      Subject Chain
                        Version:
                        Thumbprint MD5:
                        Thumbprint SHA-1:
                        Thumbprint SHA-256:
                        Serial:
                        Instruction
                        push eax
                        push ebx
                        push ecx
                        push edx
                        push esi
                        push edi
                        inc ecx
                        push eax
                        inc ecx
                        push ecx
                        inc ecx
                        push edx
                        inc ecx
                        push ebx
                        inc ecx
                        push esp
                        inc ecx
                        push ebp
                        inc ecx
                        push esi
                        inc ecx
                        push edi
                        inc ecx
                        neg eax
                        dec ecx
                        mov ecx, edi
                        dec eax
                        mov ecx, ebp
                        dec esp
                        or eax, eax
                        dec eax
                        mov ecx, edx
                        dec eax
                        xor ecx, eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        add ecx, 31h
                        dec eax
                        and ecx, eax
                        dec eax
                        sub ecx, 00000100h
                        dec eax
                        mov ecx, ebp
                        dec eax
                        dec ecx
                        dec eax
                        sub ecx, edi
                        dec eax
                        xor edi, esi
                        dec eax
                        add eax, 18h
                        xorps xmm0, xmm3
                        inc ecx
                        shr eax, 1
                        dec ecx
                        shr edi, 1
                        inc ecx
                        shr eax, 1
                        dec ecx
                        and ecx, 01h
                        inc ecx
                        and eax, 01h
                        dec eax
                        arpl ax, dx
                        dec eax
                        arpl cx, ax
                        movaps xmm1, xmm6
                        movaps xmm6, xmm1
                        movaps xmm2, xmm6
                        dec ax
                        movd eax, mm2
                        dec eax
                        shr eax, 20h
                        inc esp
                        cmp ecx, ecx
                        inc esp
                        cmp ebx, ecx
                        dec ebp
                        mov ebx, esi
                        cmove edx, ecx
                        mov edx, FFFFFFFFh
                        inc ecx
                        neg eax
                        dec ecx
                        mov ecx, edi
                        dec eax
                        mov ecx, ebp
                        dec esp
                        or eax, eax
                        dec eax
                        mov ecx, edx
                        dec eax
                        xor ecx, eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        inc eax
                        dec eax
                        add ecx, 31h
                        dec eax
                        and ecx, eax
                        dec eax
                        sub ecx, 00000100h
                        dec eax
                        mov ecx, ebp
                        dec eax
                        dec ecx
                        Programming Language:
                        • [IMP] VS2008 SP1 build 30729
                        • [C++] VS2008 SP1 build 30729
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x1bfab00x14c8.rdata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1c0f780x104.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ef0000x111630.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1ce0000x1fa58.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x252c000x4ca0.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3010000xfec.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x18bf700x54.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x18c1900x28.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x18bfd00x138.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x1700000xac0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x16e81c0x16ea0048889f443bb180ec765257c6a2c2883fFalse0.3392624073048074data6.421120250593156IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x1700000x533b60x534003a0c139778b110ba0a849c946e9f1c13False0.3114647850975976data5.393758497191826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x1c40000x9ff00x38007b6aa8f538e1b1738a168895dc8be2adFalse0.24142020089285715data3.9872470975737118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x1ce0000x1fa580x1fc00ddecc75f6a8c9ebe806716df0d89dbacFalse0.45673136072834647data6.202982287474555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        _RDATA0x1ee0000xfc0x200ae28d2bdd6b6dc8316b51d53a0feaccaFalse0.31640625data2.4452015569508707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x1ef0000x1116300x111800583ea7e3fb4407f6d2c5867487d76bcfFalse0.5867962322897623data7.48608281610237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x3010000xfec0x1000e4b9dec003dda40214237d5924a5ee0fFalse0.4365234375data5.4013704366933375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_BITMAP0x1f02a00x328Device independent bitmap graphic, 16 x -16 x 24, image size 768, resolution 4724 x 4724 px/mEnglishUnited States0.6831683168316832
                        RT_BITMAP0x1f05c80x4d8Device independent bitmap graphic, 20 x -20 x 24, image size 1200, resolution 4724 x 4724 px/mEnglishUnited States0.6629032258064517
                        RT_BITMAP0x1f0aa00x6e8Device independent bitmap graphic, 24 x -24 x 24, image size 1728, resolution 4724 x 4724 px/mEnglishUnited States0.5961538461538461
                        RT_BITMAP0x1f11880x958Device independent bitmap graphic, 28 x -28 x 24, image size 2352, resolution 4724 x 4724 px/mEnglishUnited States0.5556020066889632
                        RT_BITMAP0x1f1ae00xc28Device independent bitmap graphic, 32 x -32 x 24, image size 3072, resolution 4724 x 4724 px/mEnglishUnited States0.41002570694087404
                        RT_BITMAP0x1f27080x1928Device independent bitmap graphic, 40 x -40 x 32, image size 6400, resolution 2835 x 2835 px/mEnglishUnited States0.34767080745341616
                        RT_BITMAP0x1f40300x1b28Device independent bitmap graphic, 48 x -48 x 24, image size 6912, resolution 4724 x 4724 px/mEnglishUnited States0.5100690448791715
                        RT_BITMAP0x1f5b580x30028Device independent bitmap graphic, 256 x 256 x 24, image size 196608, resolution 4724 x 4724 px/mEnglishUnited States0.1254830967007038
                        RT_ICON0x225b800x43f2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9978728297113947
                        RT_ICON0x229f740x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.12925884301431445
                        RT_ICON0x23a79c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.23240434577231933
                        RT_ICON0x23e9c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.300103734439834
                        RT_ICON0x240f6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.4017354596622889
                        RT_ICON0x2420140x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6196808510638298
                        RT_STRING0x24247c0x136Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 00.5161290322580645
                        RT_STRING0x2425b40x108Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ArabicSaudi Arabia0.5681818181818182
                        RT_STRING0x2426bc0x98Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ChineseTaiwan0.8092105263157895
                        RT_STRING0x2427540x124Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CzechCzech Republic0.5273972602739726
                        RT_STRING0x2428780xfcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0DanishDenmark0.5714285714285714
                        RT_STRING0x2429740x106Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0GermanGermany0.5076335877862596
                        RT_STRING0x242a7c0x15cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0GreekGreece0.5488505747126436
                        RT_STRING0x242bd80xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0EnglishUnited States0.5541666666666667
                        RT_STRING0x242cc80x126Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0FinnishFinland0.5306122448979592
                        RT_STRING0x242df00x140Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0FrenchFrance0.51875
                        RT_STRING0x242f300xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HebrewIsrael0.6083333333333333
                        RT_STRING0x2430200x102Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HungarianHungary0.5891472868217055
                        RT_STRING0x2431240xfeMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ItalianItaly0.5551181102362205
                        RT_STRING0x2432240xceMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0JapaneseJapan0.7427184466019418
                        RT_STRING0x2432f40xa4Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0KoreanNorth Korea0.8109756097560976
                        RT_STRING0x2432f40xa4Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0KoreanSouth Korea0.8109756097560976
                        RT_STRING0x2433980x134Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0DutchNetherlands0.5
                        RT_STRING0x2434cc0x11eMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0NorwegianNorway0.5244755244755245
                        RT_STRING0x2435ec0x11cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PolishPoland0.5422535211267606
                        RT_STRING0x2437080x14cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortugueseBrazil0.4939759036144578
                        RT_STRING0x2438540x138Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0RussianRussia0.5384615384615384
                        RT_STRING0x24398c0x13eMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovakSlovakia0.5377358490566038
                        RT_STRING0x243acc0x128Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SwedishSweden0.5236486486486487
                        RT_STRING0x243bf40x102Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ThaiThailand0.624031007751938
                        RT_STRING0x243cf80x178Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0TurkishTurkey0.4787234042553192
                        RT_STRING0x243e700x146Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0UkrainianUkrain0.5521472392638037
                        RT_STRING0x243fb80x124Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovenianSlovenia0.541095890410959
                        RT_STRING0x2440dc0x90Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0ChineseChina0.7708333333333334
                        RT_STRING0x24416c0xf0Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0EnglishGreat Britain0.5541666666666667
                        RT_STRING0x24425c0x136Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SpanishMexico0.5129032258064516
                        RT_STRING0x2443940x160Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortuguesePortugal0.4744318181818182
                        RT_STRING0x2444f40x48adata0.35628227194492257
                        RT_STRING0x2449800x396dataArabicSaudi Arabia0.3888888888888889
                        RT_STRING0x244d180x21adataChineseTaiwan0.5204460966542751
                        RT_STRING0x244f340x3d4dataCzechCzech Republic0.3989795918367347
                        RT_STRING0x2453080x3e0dataDanishDenmark0.36189516129032256
                        RT_STRING0x2456e80x468dataGermanGermany0.37145390070921985
                        RT_STRING0x245b500x47adataGreekGreece0.41273996509598604
                        RT_STRING0x245fcc0x38edataEnglishUnited States0.3648351648351648
                        RT_STRING0x24635c0x3d8dataFinnishFinland0.36585365853658536
                        RT_STRING0x2467340x420dataFrenchFrance0.375
                        RT_STRING0x246b540x3ecdataHebrewIsrael0.3754980079681275
                        RT_STRING0x246f400x3ecdataHungarianHungary0.3904382470119522
                        RT_STRING0x24732c0x468dataItalianItaly0.3599290780141844
                        RT_STRING0x2477940x290dataJapaneseJapan0.5091463414634146
                        RT_STRING0x247a240x26cAmigaOS bitmap font "\254\307 ", fc_YSize 24832, 1238 elements, 2nd "a", 3rd " "KoreanNorth Korea0.5290322580645161
                        RT_STRING0x247a240x26cAmigaOS bitmap font "\254\307 ", fc_YSize 24832, 1238 elements, 2nd "a", 3rd " "KoreanSouth Korea0.5290322580645161
                        RT_STRING0x247c900x410dataDutchNetherlands0.36153846153846153
                        RT_STRING0x2480a00x406dataNorwegianNorway0.3592233009708738
                        RT_STRING0x2484a80x406dataPolishPoland0.3941747572815534
                        RT_STRING0x2488b00x466dataPortugueseBrazil0.3614564831261101
                        RT_STRING0x248d180x488dataRussianRussia0.4025862068965517
                        RT_STRING0x2491a00x39adataSlovakSlovakia0.4522776572668113
                        RT_STRING0x24953c0x3c6dataSwedishSweden0.37267080745341613
                        RT_STRING0x2499040x3c2dataThaiThailand0.40436590436590436
                        RT_STRING0x249cc80x3b4dataTurkishTurkey0.4040084388185654
                        RT_STRING0x24a07c0x55edataUkrainianUkrain0.3369723435225619
                        RT_STRING0x24a5dc0x3dcdataSlovenianSlovenia0.39068825910931176
                        RT_STRING0x24a9b80x210dataChineseChina0.5170454545454546
                        RT_STRING0x24abc80x38edataEnglishGreat Britain0.3648351648351648
                        RT_STRING0x24af580x488dataSpanishMexico0.35
                        RT_STRING0x24b3e00x4b2dataPortuguesePortugal0.3319467554076539
                        RT_STRING0x24b8940x50adata0.3573643410852713
                        RT_STRING0x24bda00x44aAmigaOS bitmap font "D\0061\006,\006'\006!\006 ", fc_YSize 11776, 9990 elements, 2nd " ", 3rd "1\006J\006/\006 "ArabicSaudi Arabia0.3879781420765027
                        RT_STRING0x24c1ec0x238dataChineseTaiwan0.5598591549295775
                        RT_STRING0x24c4240x43edataCzechCzech Republic0.40423572744014735
                        RT_STRING0x24c8640x434dataDanishDenmark0.38104089219330856
                        RT_STRING0x24cc980x4e4dataGermanGermany0.3730031948881789
                        RT_STRING0x24d17c0x53cdataGreekGreece0.4052238805970149
                        RT_STRING0x24d6b80x416dataEnglishUnited States0.372848948374761
                        RT_STRING0x24dad00x488dataFinnishFinland0.36551724137931035
                        RT_STRING0x24df580x554dataFrenchFrance0.37976539589442815
                        RT_STRING0x24e4ac0x3e8dataHebrewIsrael0.419
                        RT_STRING0x24e8940x4dadataHungarianHungary0.39855072463768115
                        RT_STRING0x24ed700x4c4dataItalianItaly0.36311475409836064
                        RT_STRING0x24f2340x2f4dataJapaneseJapan0.5595238095238095
                        RT_STRING0x24f5280x2d8dataKoreanNorth Korea0.5892857142857143
                        RT_STRING0x24f5280x2d8dataKoreanSouth Korea0.5892857142857143
                        RT_STRING0x24f8000x49adataDutchNetherlands0.37436332767402375
                        RT_STRING0x24fc9c0x40edataNorwegianNorway0.38246628131021193
                        RT_STRING0x2500ac0x544dataPolishPoland0.37537091988130566
                        RT_STRING0x2505f00x4badataPortugueseBrazil0.39090909090909093
                        RT_STRING0x250aac0x4c8dataRussianRussia0.4027777777777778
                        RT_STRING0x250f740x498dataSlovakSlovakia0.4098639455782313
                        RT_STRING0x25140c0x470dataSwedishSweden0.37764084507042256
                        RT_STRING0x25187c0x41adataThaiThailand0.4180952380952381
                        RT_STRING0x251c980x510AmigaOS bitmap font "\374", fc_YSize 27904, 19456 elements, 2nd "4", 3rd "a"TurkishTurkey0.38503086419753085
                        RT_STRING0x2521a80x5c6dataUkrainianUkrain0.36400541271989173
                        RT_STRING0x2527700x4bcdataSlovenianSlovenia0.37293729372937295
                        RT_STRING0x252c2c0x23edataChineseChina0.5592334494773519
                        RT_STRING0x252e6c0x418dataEnglishGreat Britain0.37309160305343514
                        RT_STRING0x2532840x51adataSpanishMexico0.3460949464012251
                        RT_STRING0x2537a00x4b0dataPortuguesePortugal0.3641666666666667
                        RT_STRING0x253c500x144Matlab v4 mat-file (little endian) , numeric, rows 0, columns 00.38271604938271603
                        RT_STRING0x253d940x102dataArabicSaudi Arabia0.45348837209302323
                        RT_STRING0x253e980x76dataChineseTaiwan0.5847457627118644
                        RT_STRING0x253f100x10edataCzechCzech Republic0.4703703703703704
                        RT_STRING0x2540200x12adataDanishDenmark0.37583892617449666
                        RT_STRING0x25414c0x106dataGermanGermany0.40458015267175573
                        RT_STRING0x2542540xfadataGreekGreece0.484
                        RT_STRING0x2543500xf6dataEnglishUnited States0.42276422764227645
                        RT_STRING0x2544480xfadataFinnishFinland0.4
                        RT_STRING0x2545440x120Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0FrenchFrance0.4340277777777778
                        RT_STRING0x2546640xc6dataHebrewIsrael0.5202020202020202
                        RT_STRING0x25472c0x126dataHungarianHungary0.41836734693877553
                        RT_STRING0x2548540x10edataItalianItaly0.4222222222222222
                        RT_STRING0x2549640x82dataJapaneseJapan0.5846153846153846
                        RT_STRING0x2549e80x78dataKoreanNorth Korea0.5833333333333334
                        RT_STRING0x2549e80x78dataKoreanSouth Korea0.5833333333333334
                        RT_STRING0x254a600x114dataDutchNetherlands0.38405797101449274
                        RT_STRING0x254b740x12cdataNorwegianNorway0.36666666666666664
                        RT_STRING0x254ca00x12edataPolishPoland0.38741721854304634
                        RT_STRING0x254dd00x140Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0PortugueseBrazil0.384375
                        RT_STRING0x254f100x106dataRussianRussia0.44274809160305345
                        RT_STRING0x2550180x120dataSlovakSlovakia0.4513888888888889
                        RT_STRING0x2551380x12adataSwedishSweden0.3859060402684564
                        RT_STRING0x2552640x100dataThaiThailand0.41796875
                        RT_STRING0x2553640xf2dataTurkishTurkey0.4628099173553719
                        RT_STRING0x2554580x10cdataUkrainianUkrain0.4701492537313433
                        RT_STRING0x2555640x104dataSlovenianSlovenia0.4307692307692308
                        RT_STRING0x2556680x70dataChineseChina0.5535714285714286
                        RT_STRING0x2556d80xf6dataEnglishGreat Britain0.42276422764227645
                        RT_STRING0x2557d00x15eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0SpanishMexico0.4
                        RT_STRING0x2559300x12edataPortuguesePortugal0.37748344370860926
                        RT_MESSAGETABLE0x255a600x20Matlab v4 mat-file (little endian) %, text, rows 1, columns 1, imaginaryEnglishUnited States0.875
                        RT_GROUP_ICON0x255a800x5adataEnglishUnited States0.7666666666666667
                        RT_VERSION0x255adc0x360data0.44328703703703703
                        RT_VERSION0x255e3c0x360dataArabicSaudi Arabia0.4444444444444444
                        RT_VERSION0x25619c0x368dataChineseTaiwan0.44495412844036697
                        RT_VERSION0x2565040x360dataCzechCzech Republic0.44328703703703703
                        RT_VERSION0x2568640x360dataGermanGermany0.4444444444444444
                        RT_VERSION0x256bc40x360dataGreekGreece0.44560185185185186
                        RT_VERSION0x256f240x360dataEnglishUnited States0.4398148148148148
                        RT_VERSION0x2572840x360dataFinnishFinland0.44328703703703703
                        RT_VERSION0x2575e40x360dataFrenchFrance0.44328703703703703
                        RT_VERSION0x2579440x360dataHebrewIsrael0.44560185185185186
                        RT_VERSION0x257ca40x360dataHungarianHungary0.44560185185185186
                        RT_VERSION0x2580040x360dataItalianItaly0.4444444444444444
                        RT_VERSION0x2583640x360dataJapaneseJapan0.44560185185185186
                        RT_VERSION0x2586c40x360dataKoreanNorth Korea0.44675925925925924
                        RT_VERSION0x2586c40x360dataKoreanSouth Korea0.44675925925925924
                        RT_VERSION0x258a240x360dataDutchNetherlands0.44560185185185186
                        RT_VERSION0x258d840x360dataNorwegianNorway0.44328703703703703
                        RT_VERSION0x2590e40x360dataPolishPoland0.44560185185185186
                        RT_VERSION0x2594440x368dataPortugueseBrazil0.4426605504587156
                        RT_VERSION0x2597ac0x360dataRussianRussia0.44675925925925924
                        RT_VERSION0x259b0c0x360dataSlovakSlovakia0.44560185185185186
                        RT_VERSION0x259e6c0x360dataSwedishSweden0.44328703703703703
                        RT_VERSION0x25a1cc0x360dataThaiThailand0.44675925925925924
                        RT_VERSION0x25a52c0x360dataTurkishTurkey0.4444444444444444
                        RT_VERSION0x25a88c0x360dataUkrainianUkrain0.4479166666666667
                        RT_VERSION0x25abec0x360dataSlovenianSlovenia0.4444444444444444
                        RT_VERSION0x25af4c0x368dataChineseChina0.4461009174311927
                        RT_VERSION0x25b2b40x360dataEnglishGreat Britain0.44328703703703703
                        RT_VERSION0x25b6140x368dataSpanishMexico0.44380733944954126
                        RT_VERSION0x25b97c0x360dataPortuguesePortugal0.44560185185185186
                        RT_VXD0x25bcdc0xa47d4data0.8354637045304772
                        RT_MANIFEST0x3004b00x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                        DLLImport
                        SHLWAPI.dllPathFileExistsW, SHDeleteKeyW, StrStrIW, StrStrW
                        KERNEL32.dllCreateFileW, GetFileSize, ReadFile, SetFilePointer, WriteFile, FormatMessageA, WideCharToMultiByte, MultiByteToWideChar, GetStringTypeW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetLocaleInfoEx, CompareStringEx, GetCPInfo, InitializeCriticalSectionAndSpinCount, WaitForSingleObjectEx, GetModuleHandleW, RtlCaptureContext, VirtualAlloc, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlPcToFileHeader, RaiseException, RtlUnwindEx, InterlockedPushEntrySList, InterlockedFlushSList, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetFileAttributesW, GetCommandLineA, GetLocalTime, ExitProcess, GetModuleHandleExW, SetFileAttributesW, HeapAlloc, GetStdHandle, GetFileType, GetTempPathW, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, HeapReAlloc, SetConsoleCtrlHandler, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, GetProcessHeap, GetFileSizeEx, SetFilePointerEx, SetStdHandle, ReadConsoleW, HeapSize, SetEndOfFile, WriteConsoleW, GetUserDefaultUILanguage, K32GetModuleFileNameExW, K32EnumProcessModules, GetModuleFileNameW, OpenProcess, OpenThread, GetCurrentProcessId, CloseHandle, GlobalAlloc, FreeResource, FindNextFileW, DeleteFileW, GetSystemDirectoryW, CreateProcessW, ResetEvent, SetEvent, MapViewOfFileEx, CreateFileMappingW, GetSystemInfo, UnmapViewOfFile, OpenFileMappingW, LocalAlloc, CreateEventW, ReleaseMutex, FormatMessageW, GetCurrentThreadId, InitializeCriticalSection, RtlUnwind, QueryFullProcessImageNameW, CreateMutexW, OutputDebugStringW, lstrcpyW, GetProcAddress, GetModuleHandleA, GetVersionExW, HeapFree, GlobalUnlock, GlobalLock, GlobalFree, VerSetConditionMask, LoadLibraryW, GetFullPathNameW, CreateProcessA, GetModuleFileNameA, VerifyVersionInfoW, WTSGetActiveConsoleSessionId, MulDiv, K32EnumProcesses, CopyFileW, lstrlenW, lstrcmpW, LocalFree, IsWow64Process, GetThreadPriority, SetThreadPriority, GetCurrentThread, GetCurrentProcess, WaitForSingleObject, GetTempFileNameW, FindFirstFileW, FindClose, GetLastError, GetTickCount, ExitThread, CreateThread, Sleep, MoveFileExW, GetSystemWindowsDirectoryW, GetCommandLineW, LoadLibraryExW, K32GetModuleBaseNameW
                        USER32.dllReleaseDC, GetDC, GetSysColor, DestroyIcon, SystemParametersInfoW, GetMessageW, TranslateMessage, DispatchMessageW, PeekMessageW, PostThreadMessageW, DefWindowProcW, RegisterClassW, UnregisterClassW, CreateWindowExW, DestroyWindow, SetLayeredWindowAttributes, IsWindowVisible, SetTimer, KillTimer, BeginPaint, EndPaint, ValidateRect, EnumWindows, LoadCursorW, DrawIconEx, UnionRect, DisplayConfigGetDeviceInfo, ChangeDisplaySettingsExW, EnumDisplayDevicesW, EnumDisplaySettingsW, EnumDisplaySettingsExW, MonitorFromPoint, GetMonitorInfoW, GetCursorPos, WindowFromPoint, GetDesktopWindow, CharUpperW, IntersectRect, EnumDisplayMonitors, PtInRect, OffsetRect, IsZoomed, SetWindowPlacement, CopyRect, GetWindowPlacement, SetWindowLongPtrW, MonitorFromRect, EqualRect, GetWindow, IsWindowEnabled, FindWindowExW, AllowSetForegroundWindow, SetForegroundWindow, GetForegroundWindow, InsertMenuItemW, InsertMenuW, IsIconic, SetWindowPos, ShowWindow, SendMessageTimeoutW, wsprintfW, GetWindowThreadProcessId, RegisterWindowMessageW, GetAncestor, GetParent, GetWindowLongPtrW, IsRectEmpty, GetClientRect, GetWindowTextW, GetClassNameW, GetSystemMetrics, GetAsyncKeyState, LoadImageW, LoadBitmapW, LoadStringW, CharLowerW, FindWindowW, MessageBoxW, IsWindow, PostMessageW, SendMessageW, FillRect, GetWindowRect, SetProcessDPIAware
                        SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, ExtractIconExW, SHGetFileInfoW, SHGetFolderPathW, SHCreateDirectoryExW, CommandLineToArgvW, ExtractIconW
                        VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                        MSIMG32.dllTransparentBlt
                        GDI32.dllGetObjectW, SelectObject, GetDeviceCaps, DeleteDC, CreateCompatibleDC, CreateCompatibleBitmap, BitBlt, CreateSolidBrush, DeleteObject, CreateFontIndirectW, CreatePen, GetDIBits, GetStockObject, SetBkMode, StretchBlt, SetStretchBltMode, SetTextColor, BeginPath, EndPath, StrokeAndFillPath, TextOutW, SetBrushOrgEx
                        ADVAPI32.dllRegSetKeySecurity, SetSecurityDescriptorOwner, RegQueryValueExA, RegEnumValueW, RegEnumKeyW, RegDeleteValueW, CreateProcessAsUserW, SetSecurityDescriptorDacl, AllocateAndInitializeSid, SetEntriesInAclW, FreeSid, InitializeSecurityDescriptor, RegQueryInfoKeyW, RegDeleteKeyW, RegEnumKeyExW, ReportEventW, RegisterEventSourceW, SetSecurityDescriptorGroup, RevertToSelf, IsValidSecurityDescriptor, InitializeAcl, ImpersonateSelf, DeregisterEventSource, SetSecurityInfo, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorSacl, RegCopyTreeW, RegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExW, RegOpenCurrentUser, RegCloseKey, OpenProcessToken, OpenThreadToken, AccessCheck, AddAccessAllowedAce, CheckTokenMembership, CreateWellKnownSid, DuplicateTokenEx, GetLengthSid, GetTokenInformation, RegGetValueW
                        ole32.dllStringFromGUID2, CLSIDFromString, CoCreateInstance, CoInitialize, CreateStreamOnHGlobal
                        OLEAUT32.dllOleLoadPicture
                        NameOrdinalAddress
                        DMAddNewDesktop4160x18008c760
                        DMEnumDesktopInfos4040x18008c790
                        DMEnumDesktops4030x18008c7b0
                        DMGetCurrentDesktop4070x18008ca20
                        DMGetDefaultDesktop4090x18008caa0
                        DMGetDesktopCount4100x18008cac0
                        DMGetDesktopInfo4140x18008cad0
                        DMGetDesktopMask4130x18008cb40
                        DMGetGrids4200x18008cb60
                        DMGetPerMonWallpapers4110x18008cbd0
                        DMGetSetting4000x18008cc20
                        DMMoveToDesktop4170x18008cc80
                        DMRemoveDesktop4060x18008cd20
                        DMSetCurrentDesktop4080x18008cd50
                        DMSetDesktopInfo4150x18008cda0
                        DMSetGrids4190x18008ce20
                        DMSetPerMonWallpapers4120x18008ceb0
                        DMSetSetting4010x18008cf30
                        DMStoreSettings4020x18008cfe0
                        GetNViewCAPS8140x18008d010
                        HKAdd5060x18008d040
                        HKEnable5090x18008d0e0
                        HKEnumActions5040x18008d130
                        HKEnumCommands5000x18008d180
                        HKGetAction5080x18008d270
                        HKIsValidBin5100x18008d2b0
                        HKRemove5030x18008d330
                        HKSetParams5130x18008d3e0
                        NVCreateNViewMainProc2060x18008d460
                        NVDesktopSystray2290x18008d770
                        NVDisable2050x18008d910
                        NVEnable2040x18008da00
                        NVGetAppAndClassFromHwnd2250x18008dad0
                        NVGetDisplayRects2160x18008db00
                        NVGetGridSetting2610x18008db60
                        NVGetLastError2090x18008dba0
                        NVGetMonitorNames8170x18008dbb0
                        NVGetNViewExecutablePath2170x18008dbc0
                        NVGetNumDisplays2150x18008dbd0
                        NVGetNviewRootKey2300x18008dbe0
                        NVGetPseudoMaxState2180x18008dbf0
                        NVGetSystemInfo8180x18008dc50
                        NVGetWindowRectViaNviewProc2330x18008e340
                        NVIsHookEnabled2030x18008e430
                        NVLaunchSysMenu2320x18008e440
                        NVMaxToDesktop2240x18008e480
                        NVMaxToDisplay2230x18008e4a0
                        NVMaxToGrid2210x18008e4c0
                        NVMaxToOverlapGrid2220x18008e4e0
                        NVMaxToRect2190x18008e500
                        NVNotifyClientWindows2140x18008e540
                        NVOpenNViewRegKey2120x18008e550
                        NVQueryDesktopContextMenu2260x18008e590
                        NVQueryDesktopContextMenuEx2270x18008e5b0
                        NVRegisterNotificationWindow2070x18008e710
                        NVRestore2200x18008e730
                        NVRunControlPanel2020x18008e750
                        NVSaveGridsToReg2630x18008ec00
                        NVSetForegroundWindow2280x18008ec30
                        NVSetGridSetting2620x18008ec50
                        NVSetLastError2100x18008ecd0
                        NVSetWindowPosViaNviewProc2340x18008ece0
                        NVShowMonGridIDOverlay2130x18008ed20
                        NVUnregisterNotificationWindow2080x18008ed60
                        NVVirtualDisplayEDID2010x18008ed80
                        NVWaitForNViewMain2920x18008edc0
                        NVWaitForNViewMainExit2930x18008edd0
                        NViewGlobalSetting2510x18008ede0
                        NViewUserInterfaceSetting2520x18008ee30
                        PMDelete6070x18008eec0
                        PMEnum6050x18008ef90
                        PMFindProfile2860x18008f180
                        PMGetCurrentProfile6080x18008f190
                        PMGetProfileDirectory2850x18008f290
                        PMGetProfileInfo2870x18008f2a0
                        PMGetProfileInfoEx2880x18008f3c0
                        PMGetStartupProfile6090x18008f410
                        PMImport6060x18008f4a0
                        PMLoad6010x18008f4b0
                        PMLoadApp6030x18008f4c0
                        PMLoadEx6020x18008f5e0
                        PMLock6110x18008f7a0
                        PMSave6040x18008f7b0
                        PMSetStartupProfile6100x18008f900
                        PMUpdate2890x18008fa80
                        WMParseSetting3070x18008fbc0
                        WMSetSettingHWND3030x18008fbf0
                        nViewCmd1040x1800844e0
                        nViewLoadHook1020x180084b90
                        nViewUninstallNotify1060x180084bb0
                        nViewUnload1030x180084bd0
                        nviewExecute9000x180095620
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        ArabicSaudi Arabia
                        ChineseTaiwan
                        CzechCzech Republic
                        DanishDenmark
                        GermanGermany
                        GreekGreece
                        FinnishFinland
                        FrenchFrance
                        HebrewIsrael
                        HungarianHungary
                        ItalianItaly
                        JapaneseJapan
                        KoreanNorth Korea
                        KoreanSouth Korea
                        DutchNetherlands
                        NorwegianNorway
                        PolishPoland
                        PortugueseBrazil
                        RussianRussia
                        SlovakSlovakia
                        SwedishSweden
                        ThaiThailand
                        TurkishTurkey
                        UkrainianUkrain
                        SlovenianSlovenia
                        ChineseChina
                        EnglishGreat Britain
                        SpanishMexico
                        PortuguesePortugal
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 17, 2024 09:19:22.295336962 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:22.415451050 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:22.415554047 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:22.439450979 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:22.559659958 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:29.194263935 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:29.194310904 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:29.194336891 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:29.194345951 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:29.194416046 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:29.194417000 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:29.225811005 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:29.345798969 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:36.621064901 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:36.621117115 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:36.633233070 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:36.753016949 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:43.831407070 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:19:43.831598997 CET497418817192.168.2.494.232.40.41
                        Dec 17, 2024 09:19:44.984237909 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:19:45.106317997 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:19:45.106620073 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:19:45.106976032 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:19:45.226632118 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:15.554939032 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:15.554963112 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:15.554995060 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:15.555030107 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:15.555084944 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:15.560060024 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:15.679790974 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:22.195498943 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:22.195883989 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:22.196615934 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:22.316468954 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.188671112 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.188771963 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.192287922 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.192323923 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.192368031 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.192409039 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308468103 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308511972 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308547020 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308579922 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308643103 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308640003 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308640957 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308677912 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308710098 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308711052 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308711052 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308737040 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308754921 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308762074 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308794975 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308816910 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308837891 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308881998 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308916092 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308927059 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308948994 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.308958054 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.308999062 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.380614042 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.380835056 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.380835056 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.380882978 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.384877920 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.384944916 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.384989023 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.385045052 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.415731907 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.415905952 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.428917885 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.429007053 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.429053068 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.429053068 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.433073044 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.433132887 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.433187962 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.433239937 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.441751003 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.441792965 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.441807985 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.441842079 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.450268030 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.450330973 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.450371027 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.450596094 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.456341028 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.456398010 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.456413984 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.456454992 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.462308884 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.462403059 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.462443113 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.462492943 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.468319893 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.468381882 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.468424082 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.468468904 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.474358082 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.474423885 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.474476099 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.474525928 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.480427980 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.480464935 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.480485916 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.480511904 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.494163036 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.494229078 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.494261026 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.494298935 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.500618935 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.500674009 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.500758886 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.500821114 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.503690004 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.503746033 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.572829962 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.572900057 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.572962999 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.573010921 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.575784922 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.575834036 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.575875998 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.575921059 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.581872940 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.581944942 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.581976891 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.582030058 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.587805033 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.587866068 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.587908983 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.587949991 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.594101906 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.594161034 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.594248056 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.594297886 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.600042105 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.600099087 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.600132942 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.600183964 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.605858088 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.605916977 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.605953932 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.606002092 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.611824036 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.611891985 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.611934900 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.611989975 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.617244005 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.617326975 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.617362976 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.617412090 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.622457027 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.622513056 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.622550011 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.622597933 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.627686024 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.627762079 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.627791882 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.627837896 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.632873058 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.632936954 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.632953882 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.632997036 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.636133909 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.636184931 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.636265039 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.636308908 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.647068024 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647106886 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647118092 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647181034 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.647212982 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.647221088 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647232056 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647241116 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.647268057 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.647294044 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.659223080 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659235954 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659291983 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.659348965 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659399986 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.659457922 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659512043 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.659545898 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659555912 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659564972 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659574986 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.659590006 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.659612894 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.662029982 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.662087917 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.662132025 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.662178993 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.665261984 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.665311098 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.665357113 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.665399075 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.692990065 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.693042040 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.693100929 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.693144083 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.694664001 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.694724083 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.694787025 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.694827080 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.697921991 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.697988987 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.698026896 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.698070049 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.701168060 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.701210976 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.701231956 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.701268911 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.764759064 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.764823914 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.764889002 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.764889002 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.766258955 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.766417980 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.766875982 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.766932964 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.767019033 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.767070055 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.768807888 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.768860102 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.768915892 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.768960953 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.772070885 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.772123098 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.772140980 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.772187948 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.775294065 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.775346994 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.775382996 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.775427103 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.778400898 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.778451920 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.778506994 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.778553009 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.781554937 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.781609058 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.781653881 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.781698942 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.784689903 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.784742117 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.784802914 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.784843922 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.787830114 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.787877083 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.787930012 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.787975073 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.790548086 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.790592909 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.790636063 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.790684938 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.793212891 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.793260098 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.793277025 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.793315887 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.795752048 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.795804024 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.795846939 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.795892954 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:42.798315048 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:42.798372984 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.597392082 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.597438097 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.597568035 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.597784996 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.597836018 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.597901106 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.597942114 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.599597931 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.599657059 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.600092888 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.600146055 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.600234032 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.600284100 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.601914883 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.601969004 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.602030993 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.602081060 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.603699923 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.603758097 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.603811026 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.603856087 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.605505943 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.605552912 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.711086988 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.711162090 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.711174965 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.711278915 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.711432934 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.711489916 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.711534977 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.711944103 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.713217020 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.713280916 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.713335991 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.713407040 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.714979887 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.715032101 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.715073109 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.715109110 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.716794968 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.716849089 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.716914892 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.716955900 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.718600035 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.718704939 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.718750954 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.720393896 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.720541000 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.720571041 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.720782042 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.722173929 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.722215891 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.722315073 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.722354889 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.724114895 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.724181890 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.724220991 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.724301100 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.725869894 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.725888968 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.725924969 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.725948095 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.727566957 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.727617025 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.727668047 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.727751017 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.729372978 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.729422092 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.729465008 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.729504108 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.789333105 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.792454004 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.824755907 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.824839115 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.824949026 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.825623989 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.825777054 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.825831890 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.827374935 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.827442884 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.827497959 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.829189062 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.829241991 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.829298973 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.830838919 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.830977917 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.831022978 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.831091881 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.831139088 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.832830906 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.832882881 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.832997084 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.833043098 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.834579945 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.834629059 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.834745884 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.835947037 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:20:48.836389065 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.836484909 CET88174975294.232.46.11192.168.2.4
                        Dec 17, 2024 09:20:48.836534023 CET497528817192.168.2.494.232.46.11
                        Dec 17, 2024 09:21:13.845971107 CET88174974194.232.40.41192.168.2.4
                        Dec 17, 2024 09:21:13.846065044 CET497418817192.168.2.494.232.40.41
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 17, 2024 09:19:21.544512987 CET5645253192.168.2.41.1.1.1
                        Dec 17, 2024 09:19:22.289901018 CET53564521.1.1.1192.168.2.4
                        Dec 17, 2024 09:19:43.835443020 CET5671653192.168.2.41.1.1.1
                        Dec 17, 2024 09:19:44.828200102 CET5671653192.168.2.41.1.1.1
                        Dec 17, 2024 09:19:44.983184099 CET53567161.1.1.1192.168.2.4
                        Dec 17, 2024 09:19:44.983205080 CET53567161.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Dec 17, 2024 09:19:21.544512987 CET192.168.2.41.1.1.10x1ebfStandard query (0)cronoze.comA (IP address)IN (0x0001)false
                        Dec 17, 2024 09:19:43.835443020 CET192.168.2.41.1.1.10xb38eStandard query (0)muuxxu.comA (IP address)IN (0x0001)false
                        Dec 17, 2024 09:19:44.828200102 CET192.168.2.41.1.1.10xb38eStandard query (0)muuxxu.comA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 17, 2024 09:19:22.289901018 CET1.1.1.1192.168.2.40x1ebfNo error (0)cronoze.com94.232.40.41A (IP address)IN (0x0001)false
                        Dec 17, 2024 09:19:44.983184099 CET1.1.1.1192.168.2.40xb38eNo error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false
                        Dec 17, 2024 09:19:44.983205080 CET1.1.1.1192.168.2.40xb38eNo error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:03:19:00
                        Start date:17/12/2024
                        Path:C:\Windows\System32\loaddll64.exe
                        Wow64 process (32bit):false
                        Commandline:loaddll64.exe "C:\Users\user\Desktop\TiNgny4xSB.dll"
                        Imagebase:0x7ff70cf20000
                        File size:165'888 bytes
                        MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:1
                        Start time:03:19:00
                        Start date:17/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Target ID:2
                        Start time:03:19:00
                        Start date:17/12/2024
                        Path:C:\Windows\System32\cmd.exe
                        Wow64 process (32bit):false
                        Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
                        Imagebase:0x7ff787060000
                        File size:289'792 bytes
                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:03:19:00
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMAddNewDesktop
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:03:19:00
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",#1
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:03:19:01
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 4248 -s 496
                        Imagebase:0x7ff7699e0000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:8
                        Start time:03:19:03
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktopInfos
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:10
                        Start time:03:19:04
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 2492 -s 492
                        Imagebase:0x7ff7ca510000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:11
                        Start time:03:19:06
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe C:\Users\user\Desktop\TiNgny4xSB.dll,DMEnumDesktops
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:13
                        Start time:03:19:07
                        Start date:17/12/2024
                        Path:C:\Windows\System32\WerFault.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\WerFault.exe -u -p 7208 -s 488
                        Imagebase:0x7ff7ca510000
                        File size:570'736 bytes
                        MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:14
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMAddNewDesktop
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:15
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktopInfos
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:16
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",DMEnumDesktops
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:17
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nviewExecute
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:18
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUnload
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:19
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewUninstallNotify
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:20
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewLoadHook
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:21
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",nViewCmd
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000015.00000002.3015117531.0000021809ECC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000015.00000002.3020109408.000002180A014000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_BruteRatel_1, Description: Yara detected BruteRatel, Source: 00000015.00000002.3015117531.0000021809F74000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Has exited:false

                        Target ID:22
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMSetSettingHWND
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:23
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",WMParseSetting
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:24
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMUpdate
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:25
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSetStartupProfile
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:26
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMSave
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:27
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLock
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:28
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadEx
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:29
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoadApp
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:30
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMLoad
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:31
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMImport
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:32
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetStartupProfile
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:33
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfoEx
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:34
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileInfo
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:35
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetProfileDirectory
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:36
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMGetCurrentProfile
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:37
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMFindProfile
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:38
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMEnum
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:39
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",PMDelete
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:40
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewUserInterfaceSetting
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Target ID:41
                        Start time:03:19:10
                        Start date:17/12/2024
                        Path:C:\Windows\System32\rundll32.exe
                        Wow64 process (32bit):false
                        Commandline:rundll32.exe "C:\Users\user\Desktop\TiNgny4xSB.dll",NViewGlobalSetting
                        Imagebase:0x7ff6cbf50000
                        File size:71'680 bytes
                        MD5 hash:EF3179D498793BF4234F708D3BE28633
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.2%
                          Dynamic/Decrypted Code Coverage:99.2%
                          Signature Coverage:18.4%
                          Total number of Nodes:255
                          Total number of Limit Nodes:8
                          execution_graph 94016 180037788 94017 1800377aa _write_nolock 94016->94017 94018 180037806 94017->94018 94019 1800377e6 94017->94019 94053 1800377da 94017->94053 94022 180037854 94018->94022 94026 180037849 94018->94026 94074 18002f26c 63 API calls _getptd_noexit 94019->94074 94023 180037869 94022->94023 94078 180037538 65 API calls 3 library calls 94022->94078 94066 18003ec20 94023->94066 94025 1800377eb 94075 18002f2dc 63 API calls _getptd_noexit 94025->94075 94077 18002f26c 63 API calls _getptd_noexit 94026->94077 94032 1800377f3 94076 180035cb8 12 API calls _invalid_parameter_noinfo 94032->94076 94034 180037ebe WriteFile 94037 180037ee8 GetLastError 94034->94037 94038 180037edd 94034->94038 94036 180037899 GetConsoleMode 94040 1800378d9 94036->94040 94058 180037b34 94036->94058 94037->94058 94038->94037 94039 180037f0d 94039->94053 94084 18002f2dc 63 API calls _getptd_noexit 94039->94084 94041 1800378e8 GetConsoleCP 94040->94041 94040->94058 94041->94039 94063 18003790c _write_nolock 94041->94063 94043 180037c37 WriteFile 94047 180037b5f GetLastError 94043->94047 94043->94058 94044 180037f39 94085 18002f26c 63 API calls _getptd_noexit 94044->94085 94045 180037dfa WideCharToMultiByte 94049 180037e46 WriteFile 94045->94049 94050 180037b69 GetLastError 94045->94050 94046 180037d24 WriteFile 94046->94047 94059 180037cd6 94046->94059 94047->94058 94055 180037e93 GetLastError 94049->94055 94049->94059 94050->94058 94052 180037f06 94083 18002f28c 63 API calls 2 library calls 94052->94083 94086 18002cc10 94053->94086 94054 18003ff78 WriteConsoleW CreateFileW _write_nolock 94064 180037a3c 94054->94064 94055->94059 94058->94034 94058->94039 94058->94043 94058->94045 94058->94046 94058->94052 94058->94053 94081 18002f2dc 63 API calls _getptd_noexit 94058->94081 94082 18002f26c 63 API calls _getptd_noexit 94058->94082 94059->94049 94059->94058 94060 1800379be WideCharToMultiByte 94060->94058 94062 180037a01 WriteFile 94060->94062 94062->94050 94062->94064 94063->94058 94063->94060 94063->94064 94080 180038ddc 63 API calls _LocaleUpdate::_LocaleUpdate 94063->94080 94064->94050 94064->94054 94064->94058 94064->94063 94065 180037a5c WriteFile 94064->94065 94065->94047 94065->94064 94067 18003ec36 94066->94067 94068 18003ec29 94066->94068 94070 180037870 94067->94070 94096 18002f2dc 63 API calls _getptd_noexit 94067->94096 94095 18002f2dc 63 API calls _getptd_noexit 94068->94095 94070->94058 94079 1800389f4 63 API calls 2 library calls 94070->94079 94072 18003ec6d 94097 180035cb8 12 API calls _invalid_parameter_noinfo 94072->94097 94074->94025 94075->94032 94076->94053 94077->94025 94078->94023 94079->94036 94080->94063 94081->94058 94082->94058 94083->94039 94084->94044 94085->94053 94087 18002cc19 94086->94087 94088 18002cc24 94087->94088 94089 1800357c8 IsProcessorFeaturePresent 94087->94089 94090 1800357df 94089->94090 94098 180032858 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 94090->94098 94092 1800357f2 94099 18003577c SetUnhandledExceptionFilter UnhandledExceptionFilter IsDebuggerPresent _call_reportfault 94092->94099 94095->94070 94096->94072 94097->94070 94098->94092 94100 18002da78 94101 18002db0c 94100->94101 94102 18002da90 94100->94102 94123 180036dc0 DecodePointer 94101->94123 94104 18002dac8 HeapAlloc 94102->94104 94109 18002daf1 94102->94109 94113 18002daa8 94102->94113 94114 18002daf6 94102->94114 94120 180036dc0 DecodePointer 94102->94120 94104->94102 94108 18002db01 94104->94108 94105 18002db11 94124 18002f2dc 63 API calls _getptd_noexit 94105->94124 94121 18002f2dc 63 API calls _getptd_noexit 94109->94121 94113->94104 94117 180036dfc 63 API calls 2 library calls 94113->94117 94118 180036e70 63 API calls 8 library calls 94113->94118 94119 180036898 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 94113->94119 94122 18002f2dc 63 API calls _getptd_noexit 94114->94122 94117->94113 94118->94113 94120->94102 94121->94114 94122->94108 94123->94105 94124->94108 94125 1abb9100b00 94126 1abb9100b36 94125->94126 94130 1abb9100b1c 94125->94130 94127 1abb9100c3c VirtualAlloc 94128 1abb9100c6f 94127->94128 94129 1abb9100cb1 VirtualAlloc 94127->94129 94128->94126 94128->94129 94129->94126 94131 1abb9100cf3 94129->94131 94130->94126 94130->94127 94131->94126 94132 1abb9100e97 VirtualAlloc 94131->94132 94132->94126 94133 7ffdfb549790 VirtualAlloc 94134 7ffdfb555b5d 94133->94134 94134->94134 94135 1800354ac 94136 1800354d3 GetLocaleInfoEx 94135->94136 94137 1800354d7 __crtDownlevelLocaleNameToLCID 94135->94137 94138 1800354ec 94136->94138 94139 1800354dc GetLocaleInfoW 94137->94139 94139->94138 94140 18002f10c 94141 18002f128 94140->94141 94143 18002f12d 94140->94143 94154 180039844 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 94141->94154 94144 18002f1b8 94143->94144 94152 18002f182 94143->94152 94155 18002efac 94143->94155 94144->94152 94203 1800026a0 94144->94203 94147 18002f1ff 94150 18002efac _CRT_INIT 107 API calls 94147->94150 94147->94152 94149 1800026a0 _DllMainCRTStartup 180 API calls 94151 18002f1f2 94149->94151 94150->94152 94153 18002efac _CRT_INIT 107 API calls 94151->94153 94153->94147 94154->94143 94156 18002f03b 94155->94156 94157 18002efbe 94155->94157 94159 18002f091 94156->94159 94163 18002f03f _CRT_INIT 94156->94163 94207 180036780 GetProcessHeap 94157->94207 94160 18002f096 94159->94160 94164 18002f0f4 94159->94164 94237 180032904 TlsGetValue 94160->94237 94162 18002efc3 94171 18002efc7 _CRT_INIT 94162->94171 94208 180038b60 68 API calls 7 library calls 94162->94208 94163->94171 94233 1800368b0 65 API calls free 94163->94233 94164->94171 94238 1800389b8 63 API calls 2 library calls 94164->94238 94169 18002f067 94181 18002f076 _CRT_INIT 94169->94181 94234 18003670c 64 API calls free 94169->94234 94170 18002efd3 _RTC_Initialize 94170->94171 94176 18002efe3 GetCommandLineA 94170->94176 94171->94144 94175 18002f071 94235 180038be0 TlsFree _mtterm 94175->94235 94209 1800398f0 68 API calls 2 library calls 94176->94209 94181->94171 94236 180038be0 TlsFree _mtterm 94181->94236 94182 18002eff5 94210 1800363dc 94182->94210 94187 18002f001 94190 18002f005 94187->94190 94191 18002f00c 94187->94191 94228 180038be0 TlsFree _mtterm 94190->94228 94229 180039454 76 API calls 3 library calls 94191->94229 94195 18002f011 94196 18002f025 94195->94196 94230 180039710 75 API calls 6 library calls 94195->94230 94202 18002f029 94196->94202 94232 18003670c 64 API calls free 94196->94232 94199 18002f01a 94199->94196 94231 180036a30 74 API calls 5 library calls 94199->94231 94200 18002f039 94200->94190 94202->94171 94204 1800026b4 94203->94204 94205 1800026a8 94203->94205 94204->94147 94204->94149 94277 1800026c0 94205->94277 94207->94162 94208->94170 94209->94182 94239 1800301c0 94210->94239 94212 18003640b 94213 180031ae8 _calloc_crt 63 API calls 94212->94213 94214 18003641f 94213->94214 94215 18003649a GetStartupInfoW 94214->94215 94216 18003642f _wfsopen 94214->94216 94222 1800365f6 94215->94222 94223 1800364b4 94215->94223 94216->94187 94217 1800366db 94218 1800303b0 __updatetmbcinfo LeaveCriticalSection 94217->94218 94218->94216 94219 18003663e GetStdHandle 94221 180036669 GetFileType 94219->94221 94219->94222 94220 180031ae8 _calloc_crt 63 API calls 94220->94223 94221->94222 94222->94217 94222->94219 94226 18003293c __lock_fhandle InitializeCriticalSectionAndSpinCount 94222->94226 94223->94220 94223->94222 94224 180036510 94223->94224 94224->94222 94225 180036598 GetFileType 94224->94225 94227 18003293c __lock_fhandle InitializeCriticalSectionAndSpinCount 94224->94227 94225->94224 94226->94222 94227->94224 94229->94195 94230->94199 94231->94196 94232->94200 94233->94169 94234->94175 94238->94171 94240 1800301ef EnterCriticalSection 94239->94240 94241 1800301de 94239->94241 94245 18003028c 94241->94245 94246 1800302c2 94245->94246 94247 1800302a9 94245->94247 94249 1800301e3 94246->94249 94250 1800302da 94246->94250 94270 180036dfc 63 API calls 2 library calls 94247->94270 94249->94240 94269 1800369f8 63 API calls 3 library calls 94249->94269 94273 180031b68 63 API calls malloc 94250->94273 94252 1800302ae 94271 180036e70 63 API calls 8 library calls 94252->94271 94253 1800302e4 94255 1800302ec 94253->94255 94256 1800302fb 94253->94256 94274 18002f2dc 63 API calls _getptd_noexit 94255->94274 94259 1800301c0 _lock 62 API calls 94256->94259 94257 1800302b8 94272 180036898 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 94257->94272 94262 180030305 94259->94262 94261 1800302f1 94261->94249 94263 180030323 94262->94263 94264 180030310 94262->94264 94276 18002d5f4 63 API calls 2 library calls 94263->94276 94275 18003293c InitializeCriticalSectionAndSpinCount 94264->94275 94267 18003031d LeaveCriticalSection 94267->94249 94270->94252 94271->94257 94273->94253 94274->94261 94275->94267 94276->94267 94329 180002cb0 GetModuleFileNameW 94277->94329 94279 180002709 _vsnprintf_helper 94280 18000275b 6 API calls 94279->94280 94339 180005f70 94280->94339 94284 180002843 94347 180005250 161 API calls 2 library calls 94284->94347 94286 180002855 94287 18000287f 94286->94287 94348 1800023f0 65 API calls 2 library calls 94286->94348 94288 180002ac1 94287->94288 94349 180006a80 65 API calls 2 library calls 94287->94349 94365 180005360 90 API calls 2 library calls 94288->94365 94292 180002895 94350 180003260 111 API calls 5 library calls 94292->94350 94293 180002acb 94295 180002af6 94293->94295 94366 1800023f0 65 API calls 2 library calls 94293->94366 94367 1800038d0 90 API calls _RunAllParam 94295->94367 94296 1800028a5 94351 180006db0 99 API calls 3 library calls 94296->94351 94300 1800028bd 94352 180006db0 99 API calls 3 library calls 94300->94352 94301 180002b22 std::ios_base::_Ios_base_dtor 94303 18002cc10 __crt_atoflt_l 7 API calls 94301->94303 94305 180002b7a 94303->94305 94304 1800028e2 94353 1800062f0 65 API calls 2 library calls 94304->94353 94305->94204 94307 18000292b 94354 180003260 111 API calls 5 library calls 94307->94354 94309 180002939 94355 180006db0 99 API calls 3 library calls 94309->94355 94311 180002951 94356 180006db0 99 API calls 3 library calls 94311->94356 94313 180002999 94357 1800062f0 65 API calls 2 library calls 94313->94357 94315 1800029bf 94358 180003260 111 API calls 5 library calls 94315->94358 94317 1800029cd 94359 180006db0 99 API calls 3 library calls 94317->94359 94319 1800029e5 94360 180006db0 99 API calls 3 library calls 94319->94360 94321 180002a2d 94361 1800062f0 65 API calls 2 library calls 94321->94361 94323 180002a53 94362 180003260 111 API calls 5 library calls 94323->94362 94325 180002a61 94363 180006db0 99 API calls 3 library calls 94325->94363 94327 180002a79 94364 180006db0 99 API calls 3 library calls 94327->94364 94330 180002d06 94329->94330 94331 180002d2e 94329->94331 94368 1800062f0 65 API calls 2 library calls 94330->94368 94369 1800062f0 65 API calls 2 library calls 94331->94369 94334 18002cc10 __crt_atoflt_l 7 API calls 94335 180002e8a 94334->94335 94335->94279 94336 180002d29 _Xp_mulx 94336->94334 94337 180002d79 _DllMainCRTStartup 94337->94336 94370 180003890 65 API calls messages 94337->94370 94371 180002510 70 API calls 3 library calls 94339->94371 94341 180005f8f _DllMainCRTStartup 94372 180006940 99 API calls 7 library calls 94341->94372 94343 180005fb1 94344 180002810 94343->94344 94373 1800023f0 65 API calls 2 library calls 94343->94373 94346 1800051b0 70 API calls _DllMainCRTStartup 94344->94346 94346->94284 94347->94286 94348->94287 94349->94292 94350->94296 94351->94300 94352->94304 94353->94307 94354->94309 94355->94311 94356->94313 94357->94315 94358->94317 94359->94319 94360->94321 94361->94323 94362->94325 94363->94327 94364->94288 94365->94293 94366->94295 94367->94301 94368->94336 94369->94337 94370->94336 94371->94341 94372->94343 94373->94344

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: +=$,=
                          • API String ID: 0-3116756818
                          • Opcode ID: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                          • Instruction ID: 217750a8d1908cb955c2d51eded8c7d8101ab4a50f48bc8bcf8da0a0d082182f
                          • Opcode Fuzzy Hash: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                          • Instruction Fuzzy Hash: E3242B52F7569C06EE59C1720AB17FA40C65FB6BE9F64F73AFC0A26BE0D91E54834080

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 9 7ffdfb549790-7ffdfb555b56 VirtualAlloc 10 7ffdfb555b5d-7ffdfb555c04 9->10 10->10 11 7ffdfb555c0a-7ffdfb557afd 10->11
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                          • Instruction ID: 35dcd01f8609a933a9e15dee1416dc6d2e9547fcda4a8b132a070716fc7f6b63
                          • Opcode Fuzzy Hash: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                          • Instruction Fuzzy Hash: F6142B52F7569C06EE59C1720AA17FA80C65FB67E9F64F73AFC0A26BE0DD1E54834080

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 12 1800026c0-18000280b call 180002cb0 call 18002f4a0 * 3 GetModuleFileNameW SHGetSpecialFolderPathW lstrcatW * 4 call 180005f70 22 180002810-180002858 call 1800051b0 call 180005250 12->22 27 18000285a-180002872 22->27 28 180002880-180002885 22->28 29 180002874 27->29 30 180002877-18000287f call 1800023f0 27->30 31 180002ac1-180002ace call 180005360 28->31 32 18000288b-1800028ab call 180006a80 call 180003260 28->32 29->30 30->28 40 180002af7-180002b5d call 1800038d0 call 180007928 31->40 41 180002ad0-180002ae9 31->41 47 1800028ad 32->47 48 1800028b0-1800028c6 call 180006db0 32->48 55 180002b6b-180002b92 call 18002cc10 40->55 56 180002b5f-180002b66 call 18002e8fc 40->56 43 180002aeb 41->43 44 180002aee-180002af6 call 1800023f0 41->44 43->44 44->40 47->48 57 1800028d1-1800028fa call 180006db0 48->57 58 1800028c8-1800028cc call 18002e8fc 48->58 56->55 65 180002901-18000290c 57->65 66 1800028fc-1800028ff 57->66 58->57 68 180002910-180002919 65->68 67 18000291b-18000293f call 1800062f0 call 180003260 66->67 73 180002941 67->73 74 180002944-18000295a call 180006db0 67->74 68->67 68->68 73->74 77 180002965-18000297d 74->77 78 18000295c-180002960 call 18002e8fc 74->78 80 180002988-1800029d3 call 180006db0 call 1800062f0 call 180003260 77->80 81 18000297f-180002983 call 18002e8fc 77->81 78->77 89 1800029d5 80->89 90 1800029d8-1800029ee call 180006db0 80->90 81->80 89->90 93 1800029f9-180002a11 90->93 94 1800029f0-1800029f4 call 18002e8fc 90->94 96 180002a13-180002a17 call 18002e8fc 93->96 97 180002a1c-180002a67 call 180006db0 call 1800062f0 call 180003260 93->97 94->93 96->97 105 180002a69 97->105 106 180002a6c-180002a82 call 180006db0 97->106 105->106 109 180002a84-180002a88 call 18002e8fc 106->109 110 180002a8d-180002aa5 106->110 109->110 112 180002aa7-180002aab call 18002e8fc 110->112 113 180002ab0-180002abc call 180006db0 110->113 112->113 113->31
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: lstrcat$FileModuleName$FolderIos_base_dtorPathSpecialstd::ios_base::_
                          • String ID: \NTUSER.DAT.Not$nViewCmd
                          • API String ID: 2606783807-1926657965
                          • Opcode ID: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                          • Instruction ID: 3dd1c745be193ef327f8b6b82ef9b9860cbb876b441ce7f55bb8257e988bbc7a
                          • Opcode Fuzzy Hash: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                          • Instruction Fuzzy Hash: 7FE15B32224B8989EBA1DF24D8943DD3761FB897C8F809126F64E47AA9DF74C64DC740

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3010135300.000001ABB9100000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001ABB9100000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1abb9100000_loaddll64.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                          • Instruction ID: 7dfc6ee1f97dc18e7abf28b850f0c568775909a36764838c8c8edc3bcf82f8d6
                          • Opcode Fuzzy Hash: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                          • Instruction Fuzzy Hash: 47E14D3021DB889FE794EB28C099B6ABBE0FB9D349F50495DF489C3261D775D880DB02
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$GetcollGetctypeGetvals
                          • String ID:
                          • API String ID: 553569086-0
                          • Opcode ID: cc1d26aba2546da7b1fcf5844c4f230db50ba833807d6ae51ac09d0ade22bb7f
                          • Instruction ID: 5bf8247adae537453bda2b6c8797fb481ab5400ec694285e6291f3079d4658d1
                          • Opcode Fuzzy Hash: cc1d26aba2546da7b1fcf5844c4f230db50ba833807d6ae51ac09d0ade22bb7f
                          • Instruction Fuzzy Hash: 79823D21B0BE43D5EB569F15D870AB826A1AF44784F085535EA2E8B7FBDF3CE5818340

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1721 7ffdfb5e59e0-7ffdfb5e5a2d call 7ffdfb505ed0 1724 7ffdfb5e5e86-7ffdfb5e5eb1 RegCloseKey call 7ffdfb545ec0 1721->1724 1725 7ffdfb5e5a33-7ffdfb5e5a7c SHDeleteKeyW call 7ffdfb505e70 1721->1725 1730 7ffdfb5e5a82-7ffdfb5e5a8a 1725->1730 1731 7ffdfb5e5e7e 1725->1731 1732 7ffdfb5e5a92-7ffdfb5e5aa1 call 7ffdfb5e4dd0 1730->1732 1731->1724 1735 7ffdfb5e5aa7-7ffdfb5e5aab 1732->1735 1736 7ffdfb5e5e62-7ffdfb5e5e68 1732->1736 1735->1736 1738 7ffdfb5e5ab1-7ffdfb5e5b18 call 7ffdfb5e44a0 call 7ffdfb505e70 lstrlenW RegSetValueExW 1735->1738 1736->1732 1737 7ffdfb5e5e6e-7ffdfb5e5e76 1736->1737 1737->1731 1743 7ffdfb5e5b1a-7ffdfb5e5b46 RegSetValueExW 1738->1743 1744 7ffdfb5e5b49-7ffdfb5e5b4b 1738->1744 1743->1744 1745 7ffdfb5e5b4d-7ffdfb5e5b7c RegSetValueExW 1744->1745 1746 7ffdfb5e5b7f-7ffdfb5e5b81 1744->1746 1745->1746 1747 7ffdfb5e5b87-7ffdfb5e5c3e call 7ffdfb50cad0 lstrlenW RegSetValueExW lstrlenW RegSetValueExW 1746->1747 1748 7ffdfb5e5c41-7ffdfb5e5c43 1746->1748 1747->1748 1750 7ffdfb5e5c7b-7ffdfb5e5c7d 1748->1750 1751 7ffdfb5e5c45-7ffdfb5e5c78 lstrlenW RegSetValueExW 1748->1751 1753 7ffdfb5e5d18-7ffdfb5e5d1d 1750->1753 1754 7ffdfb5e5c83-7ffdfb5e5c8a 1750->1754 1751->1750 1753->1736 1755 7ffdfb5e5d23-7ffdfb5e5d59 1753->1755 1756 7ffdfb5e5c90 call 7ffdfb547a20 1754->1756 1757 7ffdfb5e5d5d call 7ffdfb547a20 1755->1757 1758 7ffdfb5e5c95-7ffdfb5e5cae 1756->1758 1759 7ffdfb5e5d62-7ffdfb5e5e5c call 7ffdfb5e4a70 RegSetValueExW * 4 lstrlenW RegSetValueExW 1757->1759 1760 7ffdfb5e5cb0-7ffdfb5e5cba 1758->1760 1759->1736 1761 7ffdfb5e5cbc-7ffdfb5e5cc4 1760->1761 1762 7ffdfb5e5cd3-7ffdfb5e5d12 lstrlenW RegSetValueExW 1760->1762 1761->1762 1764 7ffdfb5e5cc6-7ffdfb5e5cd1 1761->1764 1762->1753 1764->1760 1764->1762
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Value$lstrlen$CloseCreate$CurrentDeleteOpenUser
                          • String ID: Action$Alt$Application$Ctrl$Desktop$DesktopGUID$Flags$Hotkeys$Key$MonGridID$Profile$Shift$Software\NVIDIA Corporation\Global\nView$Window
                          • API String ID: 1715684290-2541343727
                          • Opcode ID: a33a7fb957cd7eaee88febeababe780ee3a1b426742b96cacf49444184a1573b
                          • Instruction ID: f3b8c8d18dfe1f16658f80cfcc98e9268aec8fa474d76964cf4d6ed89e0290d0
                          • Opcode Fuzzy Hash: a33a7fb957cd7eaee88febeababe780ee3a1b426742b96cacf49444184a1573b
                          • Instruction Fuzzy Hash: 0CD1A376719B8286EB61CF15F460AAAB7A1FB85784F484031DA9D47BADDF3CD109CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockitstd::_$Lockit::_Lockit::~_$Getcoll$Getvals
                          • String ID:
                          • API String ID: 3082291583-0
                          • Opcode ID: 8b1a8ad9373894655f5b98a5904e86640b72ee8057499afeee4d687079a7b8ae
                          • Instruction ID: 925917399839b31c3fa4233e8538665cfc92662169927ba2c9f214a440bf4fec
                          • Opcode Fuzzy Hash: 8b1a8ad9373894655f5b98a5904e86640b72ee8057499afeee4d687079a7b8ae
                          • Instruction Fuzzy Hash: 27324C21B1BA53D4EB429B15D870ABA37A5AF44784F085435EA2D4B7FFDE3CE6818340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _invoke_watson$Locale$SleepUpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crtmalloc
                          • String ID:
                          • API String ID: 3294838543-0
                          • Opcode ID: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                          • Instruction ID: 084eb429915106ff2183acdcc5e5956807c1a06688872eada26f31bf39ac8827
                          • Opcode Fuzzy Hash: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                          • Instruction Fuzzy Hash: C8220332320A4882EBA7DA65E51A3EF2391F7497C4F45D126EF4E8E695DF38D6098300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: AddressProc$Local$Free$AllocConditionInfoMaskVerifyVersion
                          • String ID: SetupDiDestroyDeviceInfoList$SetupDiEnumDeviceInfo$SetupDiGetClassDevsW$SetupDiGetDeviceInterfaceDetailW$SetupDiGetDeviceRegistryPropertyW$Setupapi.dll
                          • API String ID: 3934038308-2811369298
                          • Opcode ID: e85f8b9fea547775601d8e81dcbe227e5add79599dd2361e74400f1dff2c490d
                          • Instruction ID: 16c499cfa4e32fb392a153a65e403dfbc6b50d52caab379cb345b26644267c49
                          • Opcode Fuzzy Hash: e85f8b9fea547775601d8e81dcbe227e5add79599dd2361e74400f1dff2c490d
                          • Instruction Fuzzy Hash: 0C917A65B0BB4786EB628F25E864A7563A1BF44B94F484231CA6D067FDEF7CE584C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID: $0123456789-
                          • API String ID: 491317670-700845222
                          • Opcode ID: bfea4566b3dd4f2453845a7a2c0565e6247bc10b50b38d8d916d4313fb2cf9fb
                          • Instruction ID: a70e222771d2648924d77d9fb61618b5019d1f7d64ecee5f6b6d25d0e3028cf4
                          • Opcode Fuzzy Hash: bfea4566b3dd4f2453845a7a2c0565e6247bc10b50b38d8d916d4313fb2cf9fb
                          • Instruction Fuzzy Hash: 99A26D32704A8885EBA68B65D0503ED27B1FB49BC8F54D016EE4E1BB96DF34CB99D340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID: $0123456789-
                          • API String ID: 491317670-700845222
                          • Opcode ID: 7023ceb1d819ec1a1cf44c7629e55f05b0496f09250da5da42953131b9d5b64b
                          • Instruction ID: 80943f5e6f8277e2c6515c65fe0f4c286d5afc9ab992b988177440c4078c9487
                          • Opcode Fuzzy Hash: 7023ceb1d819ec1a1cf44c7629e55f05b0496f09250da5da42953131b9d5b64b
                          • Instruction Fuzzy Hash: 3FA26F32B04A8885EBA68B65D4503ED27B1FB49BC8F54D416FE4E17BA5DF34CA99C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID: $0123456789-
                          • API String ID: 491317670-700845222
                          • Opcode ID: 5b1f11ae308e5f978eadb6c2e653d3aa161437b62689c1e79878b92cd71a40da
                          • Instruction ID: 357b8073b20dd1810e5d3b735acf5af2621e0edfda92cd437dcbf710b5a8daa8
                          • Opcode Fuzzy Hash: 5b1f11ae308e5f978eadb6c2e653d3aa161437b62689c1e79878b92cd71a40da
                          • Instruction Fuzzy Hash: 10A2C032604A8889FBA7CB65C4503EC27A1F749BC9F94C516EE8A1B7D6CF79C649C304
                          APIs
                          • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FFDFB4F3EFF
                            • Part of subcall function 00007FFDFB507DB0: OutputDebugStringW.KERNEL32(?,?,00000000,00007FFDFB4F3F9F), ref: 00007FFDFB507DCC
                            • Part of subcall function 00007FFDFB4F3AC0: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FFDFB4F4091
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$DebugOutputString
                          • String ID: PROCESS_DPI_UNAWARE: $PROCESS_SYSTEM_DPI_AWARE:$pos(%4i %4i) size(%4i %4i)
                          • API String ID: 2094900029-4252665117
                          • Opcode ID: 85a60f2d8ffb92b3b955a4c4e3d9345ff51b603904541ac03c4a1694e57f1e83
                          • Instruction ID: add3b8c0c5b4b7a964252f38a127ea519940a33b0a4cdb2cc9c6b8de9b4e82cc
                          • Opcode Fuzzy Hash: 85a60f2d8ffb92b3b955a4c4e3d9345ff51b603904541ac03c4a1694e57f1e83
                          • Instruction Fuzzy Hash: 2DF1C272B1968285EB00CB69E950AAD6771FB85798F405231EEAD57BEDDF3CD180C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandledVirtual$AllocCaptureContextDebuggerPresentUnwind
                          • String ID:
                          • API String ID: 652048205-0
                          • Opcode ID: 74f302650ea22c8baa3c60128528fb1732c039564dfa2e4d10febfda72840b98
                          • Instruction ID: 0ef7ae8c6c6b41c38304b2b7454c1da3b4eefa8411bf3fa8f5f80d4716b8c325
                          • Opcode Fuzzy Hash: 74f302650ea22c8baa3c60128528fb1732c039564dfa2e4d10febfda72840b98
                          • Instruction Fuzzy Hash: DC31AF36719F8286DB618F24E8606AE73A4FB88754F440135EAAD43BA9DF3CC2458B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$IntersectRect_invalid_parameter_noinfo
                          • String ID: %s.%d
                          • API String ID: 4259794798-645285463
                          • Opcode ID: 6438858dd273fba176203d8a1c05fd6ef383d212fa491cf30b253a11f741a631
                          • Instruction ID: 2b4b9115c4cab38a978847534764768e98840fb109734beb888676cb0526643f
                          • Opcode Fuzzy Hash: 6438858dd273fba176203d8a1c05fd6ef383d212fa491cf30b253a11f741a631
                          • Instruction Fuzzy Hash: C122B172B0A6C286E7608F14E1647A9BBA0FB44784F544136EAAD477EDDF3CE544CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID:
                          • API String ID: 491317670-0
                          • Opcode ID: 32a054681ada761a3f21b934110cbacde2a58451cc4452ceb2e2b32a685144d7
                          • Instruction ID: ae333f1357bb5ac04765cce638402cad7685101a5c7d4aa2e7d208c612dcf27a
                          • Opcode Fuzzy Hash: 32a054681ada761a3f21b934110cbacde2a58451cc4452ceb2e2b32a685144d7
                          • Instruction Fuzzy Hash: 1F32B032604E9885EBA68F25D8453ED63A4F75CBC8F548111FB8957B99EF38CA89C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID:
                          • API String ID: 491317670-0
                          • Opcode ID: d8653a78ccc0500016ee3a39bc8ed8050953f96735a7a63760c9342397005fa0
                          • Instruction ID: 4647e442d3bcfc851c9f4701ce4f14d67acf718bc96bb144a9f397481643842c
                          • Opcode Fuzzy Hash: d8653a78ccc0500016ee3a39bc8ed8050953f96735a7a63760c9342397005fa0
                          • Instruction Fuzzy Hash: 9C32B132604E9886EBA29F25D8453ED63A5F758BC8F54C111FF8957B99EF38C689C300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct$LockitLockit::_std::_
                          • String ID:
                          • API String ID: 491317670-0
                          • Opcode ID: 72a7ac2e2c1f111e1b61ae734374779d00f08ed685c08311d7ac3453d226d6ed
                          • Instruction ID: 2589bcd918802237b5c990292f2751727b1abcad383ca43231b0e5c6f6b0472f
                          • Opcode Fuzzy Hash: 72a7ac2e2c1f111e1b61ae734374779d00f08ed685c08311d7ac3453d226d6ed
                          • Instruction Fuzzy Hash: 93324E72A04BC885EB678F25C4503ED6761F399BC8F54C112EA8D57BAADF39C689C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                          • API String ID: 3643605086-3606100449
                          • Opcode ID: 94432bfd2f8d95df277d2e9dbc6edac5d8f0baf28bc49a8a7a32c7f5d36230e7
                          • Instruction ID: 5ab51ccc94a7dab44ec95765bb0b019680b649c223dae5af60e6b35ee96dccf9
                          • Opcode Fuzzy Hash: 94432bfd2f8d95df277d2e9dbc6edac5d8f0baf28bc49a8a7a32c7f5d36230e7
                          • Instruction Fuzzy Hash: C8925E37204A88C5EBA68B65C1503FD37A1FB49BC4F54C016EE9A1BBA5DF35CA5AC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                          • API String ID: 3643605086-3606100449
                          • Opcode ID: 2b3747df4bcc6815d0ca050ff0a1d26fc9399c5a2f48bb3d04cf2418fda5afce
                          • Instruction ID: 15170c7321f925de93854cd2b60bf2d9794a6949502e19fd89cf563b34aba275
                          • Opcode Fuzzy Hash: 2b3747df4bcc6815d0ca050ff0a1d26fc9399c5a2f48bb3d04cf2418fda5afce
                          • Instruction Fuzzy Hash: 46927E37204A88C5EBA68B66D1503FD27A1FB49BC8F54C415EF5A1B7A1CF35CA9AC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                          • String ID: 0123456789ABCDEFabcdef-+XxPp
                          • API String ID: 3643605086-3606100449
                          • Opcode ID: ee78207987aaf8e6898c223f5fdc8bfa83aea163ec8c7af802b6eb0c56abaefe
                          • Instruction ID: 0951dfdd3adb040bfd2425e3f0e5ac157d4fc1802d06d2afbb1654cb7f49c3dd
                          • Opcode Fuzzy Hash: ee78207987aaf8e6898c223f5fdc8bfa83aea163ec8c7af802b6eb0c56abaefe
                          • Instruction Fuzzy Hash: A782B4323096888AFBA6CBA581503FD3BA1F74ABC4F54C115EF9907796CF25CA5AC310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct
                          • String ID: 0123456789-+Ee
                          • API String ID: 4240859931-1347306980
                          • Opcode ID: d972bc5eca4d0b82fe2e94bffa6b7d9434b9e5222b7b794ba326fb571b0aa537
                          • Instruction ID: 7fa30803b5596d2040c40fa2d6deab6b9b1eebdfa1222772e05d0cd440f79c75
                          • Opcode Fuzzy Hash: d972bc5eca4d0b82fe2e94bffa6b7d9434b9e5222b7b794ba326fb571b0aa537
                          • Instruction Fuzzy Hash: E882A032208A8886FBA68B65C1523FD37A1FB49BC4F54C416EF4A17B95DF39CA59C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct
                          • String ID: 0123456789-+Ee
                          • API String ID: 4240859931-1347306980
                          • Opcode ID: 821b9d4d01ecd75d4b1e2aa44c8194800fa5c52a50f71f3b929308d42d9b6223
                          • Instruction ID: 541b46e9ef04b4a6691a8844132f360519d1f98d966391b6e758a932985ee6d9
                          • Opcode Fuzzy Hash: 821b9d4d01ecd75d4b1e2aa44c8194800fa5c52a50f71f3b929308d42d9b6223
                          • Instruction Fuzzy Hash: CF829036204A888AFBA68B65C1503FD37A1FB49BC4F54D416EF4A17795EF34CA69C310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                          • String ID:
                          • API String ID: 1584724053-0
                          • Opcode ID: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                          • Instruction ID: 3aca14fc27a6a15d1b1d6d791e791982332b7847b4ff029bd85a204ab66ebf99
                          • Opcode Fuzzy Hash: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                          • Instruction Fuzzy Hash: A331C53232078885EB97DB26D5093DE7795E789BC4F19C135BE8E4BB9ACE38C1068304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct
                          • String ID: 0123456789-+Ee
                          • API String ID: 4240859931-1347306980
                          • Opcode ID: e67974f2d9ac711acb042ba2c3b51c72e12c7e8c571ddf96fbd68d540ecca808
                          • Instruction ID: e252262f3d62f599d6f49dd2fa522cb368fb81fbd5ecc78d30e2ce65ba09eaa7
                          • Opcode Fuzzy Hash: e67974f2d9ac711acb042ba2c3b51c72e12c7e8c571ddf96fbd68d540ecca808
                          • Instruction Fuzzy Hash: 9372A23260A68899FB96CBA681503EC3BA1BB49BC8F54C155EF99077D6CF35C65EC300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunct
                          • String ID: 0123456789ABCDEFabcdef-+Xx
                          • API String ID: 2786813426-2799312399
                          • Opcode ID: 310c16e434c6fb425f377aa5a3344d56e60155a5009237bc210dd0dc5f72e661
                          • Instruction ID: 5fe4dd189a2d79ce61165057c9ebb2e090cd9d14d433b9fec00325c66f72dead
                          • Opcode Fuzzy Hash: 310c16e434c6fb425f377aa5a3344d56e60155a5009237bc210dd0dc5f72e661
                          • Instruction Fuzzy Hash: F0129C36704A88C9FBA28F65D0507ED27A1EB49BC9F54C112EE8A1F789DF35CA49C350
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunct
                          • String ID: 0123456789ABCDEFabcdef-+Xx
                          • API String ID: 2786813426-2799312399
                          • Opcode ID: 7f9bde8d58b3e2620bf608a5cc9520c0ecd61f189b4a8a455c5414453c571840
                          • Instruction ID: 027a829814d0a7af50161521d001647e6a208036f76e6a0cfd0a3acd19813199
                          • Opcode Fuzzy Hash: 7f9bde8d58b3e2620bf608a5cc9520c0ecd61f189b4a8a455c5414453c571840
                          • Instruction Fuzzy Hash: 3312C036B04A8885FBA3CB65C4507ED37A1E749BC8F58C016EE4A1B7A5CF35CA49C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Mpunct
                          • String ID: 0123456789ABCDEFabcdef-+Xx
                          • API String ID: 2786813426-2799312399
                          • Opcode ID: cc0dd99451e0eb2a4836ac02799361a5a9bcabcee1e262923024bb7c99d54d77
                          • Instruction ID: f7f63c79d1b94fbb45dab63fbf242b30916648d9a31090d02f6495e4854cce8f
                          • Opcode Fuzzy Hash: cc0dd99451e0eb2a4836ac02799361a5a9bcabcee1e262923024bb7c99d54d77
                          • Instruction Fuzzy Hash: B9129036708A8889FB92CA75C4503EC3BB1A74ABD8F58C115EE491B796CF75CA4EC350
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct
                          • String ID:
                          • API String ID: 4240859931-0
                          • Opcode ID: 63fef931675e363a9749f96429758758dd3006f32cce81dee63d7a14f1cdfd87
                          • Instruction ID: b4b31d92be3c4c8e502b6ea2e0a282e668397faed0ae34e767a83c581478e39b
                          • Opcode Fuzzy Hash: 63fef931675e363a9749f96429758758dd3006f32cce81dee63d7a14f1cdfd87
                          • Instruction Fuzzy Hash: FBC1A232B06A9899FB52CFB5C4013EC63B1BB5DB88F448111EE4967A99DF39C64EC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Mpunct
                          • String ID:
                          • API String ID: 4240859931-0
                          • Opcode ID: 9787ca75ca63df748a1499e8dd1c5abcefd6f6751ff6d03e7f7fc609e9ac6cfc
                          • Instruction ID: 7c40f0623f709e12c7f828199f14d4f1bd29be792234f51f62a64cc8c6a646a4
                          • Opcode Fuzzy Hash: 9787ca75ca63df748a1499e8dd1c5abcefd6f6751ff6d03e7f7fc609e9ac6cfc
                          • Instruction Fuzzy Hash: B2C1A332B06E9889FB52CFB5D4017EC63B1BB59788F448511EE4967A89EF38C64EC340
                          APIs
                          • EnumSystemLocalesW.KERNEL32(?,?,?,?,00000001800423DB,?,?,00000140,0000000180042AAB), ref: 000000018003541D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: EnumLocalesSystem
                          • String ID:
                          • API String ID: 2099609381-0
                          • Opcode ID: ef170b939dcdfe0a6fa8f39585badaf32e39fbe27d88ffb3e5b79058c9fef6a5
                          • Instruction ID: a17f45a68611e7ce09ab532a4d12380a5d0071377e1487d1a7a9af1b51f9b2a3
                          • Opcode Fuzzy Hash: ef170b939dcdfe0a6fa8f39585badaf32e39fbe27d88ffb3e5b79058c9fef6a5
                          • Instruction Fuzzy Hash: 5EE0EC35A05A0C81F7C74B12FCD57C623A0A75D3C6FE19601E44C56A70CE7883DD8B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 8ebd1b43ab214313b2ad0a09dfd0eba3f354677c67a457a5e5e63f9d14e391ab
                          • Instruction ID: 12656fcb5de8b69835b2dd3a9c331cf0c0323df84e8e99bcec695bc93526836d
                          • Opcode Fuzzy Hash: 8ebd1b43ab214313b2ad0a09dfd0eba3f354677c67a457a5e5e63f9d14e391ab
                          • Instruction Fuzzy Hash: 3DC09B33758D0CC2FB6D1BF274953751111D31DB94F0954349D17053508D2C81DD570C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_
                          • String ID:
                          • API String ID: 3382485803-0
                          • Opcode ID: 11ca8ba6c9e4bc976ad0728efb636439ff8e0f3983e089c52a7ed5c8f874d3e2
                          • Instruction ID: 84605ef311baa56bc5b68e2491e6a8dcf644c937c9e5222fdf1f18ce1bf163ab
                          • Opcode Fuzzy Hash: 11ca8ba6c9e4bc976ad0728efb636439ff8e0f3983e089c52a7ed5c8f874d3e2
                          • Instruction Fuzzy Hash: 0A427A72604A8886FBA68F25D5503BD3361FB89BC8F54D602EF8A17B95DF38C659C300
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_
                          • String ID:
                          • API String ID: 3382485803-0
                          • Opcode ID: de02513275ad1c1a37e0096a818261c58a998aecf4f08ba4a5899afd53db8295
                          • Instruction ID: 7802ca9db5044afc23cb1f38c8e105cc531337a4395501fdb7ec6a4e23d2f7b6
                          • Opcode Fuzzy Hash: de02513275ad1c1a37e0096a818261c58a998aecf4f08ba4a5899afd53db8295
                          • Instruction Fuzzy Hash: 3D427C32604B4886FBA68B25D5803BD7361FB89BC8F54C512EF8A17B96DF39C659C300
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: LockitLockit::_std::_$Stollx
                          • String ID:
                          • API String ID: 3628700584-0
                          • Opcode ID: eb53157097b9bda4a8a3cf500f3039b16533609824c5f9a5ce3e351e3c28d2aa
                          • Instruction ID: 42b5d6b38fa8120ab5fcb54182bbeb98c0f4066ebeec1de4c937208e3a875605
                          • Opcode Fuzzy Hash: eb53157097b9bda4a8a3cf500f3039b16533609824c5f9a5ce3e351e3c28d2aa
                          • Instruction Fuzzy Hash: B8428D72704A8885EBA78B29C5403AD3762FB89BC8F14C616EF9D17796DF39C659C300
                          APIs
                          • SetLastError.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CF876
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CF9B4
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFA03
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFA8A
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFB43
                          • GetLastError.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFBA6
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFC08
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFCD4
                          • SetLastError.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFD5C
                          • LocalAlloc.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFDF3
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFE78
                          • LocalFree.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFE81
                          • SetLastError.KERNEL32(?,?,?,?,00000000,00000800,00007FFDFB5D083D,?,?,?,00007FFDFB48127B), ref: 00007FFDFB5CFE9C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$Free$AllocErrorLast
                          • String ID: .dll$\SystemRoot\system32\$system32\
                          • API String ID: 1812497382-2245151201
                          • Opcode ID: 986d128cd5ec6c03168bcf7d5a32634fd447ec2578d54a3a9d6b9f609389f4ff
                          • Instruction ID: 1bd55af3d6479dc811723d4481a6601771c81c9c07f6a1b57577c3423abd33d5
                          • Opcode Fuzzy Hash: 986d128cd5ec6c03168bcf7d5a32634fd447ec2578d54a3a9d6b9f609389f4ff
                          • Instruction Fuzzy Hash: 27F16F91B0B75342FF565B219934A7966A2AF44BC4F484135DE2E477FAEF2CE84E8200
                          APIs
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBC56
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBC86
                          • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBCC1
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBCFC
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBD25
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBD50
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBE27
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBEFC
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBF27
                          • LocalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBF8A
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CBFDD
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CC010
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CC03A
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CC043
                          • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FFDFB5CC04C
                            • Part of subcall function 00007FFDFB5CD730: VerSetConditionMask.KERNEL32 ref: 00007FFDFB5CD77C
                            • Part of subcall function 00007FFDFB5CD730: VerifyVersionInfoW.KERNEL32 ref: 00007FFDFB5CD7A7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Local$Free$Alloc$AddressProc$ConditionInfoMaskVerifyVersion
                          • String ID: D3DKMTEnumAdapters2$D3DKMTEnumAdapters3$D3DKMTQueryAdapterInfo$NVDA$\SystemRoot\system32\$gdi32.dll$nvpowerapi.dll
                          • API String ID: 2279137159-3107539435
                          • Opcode ID: d09d7bbbbed21704cfcfd05ad7500aad5fc57f30abe4b9fb1f51d63267c4621c
                          • Instruction ID: d485468fae2b21b06e224e318b70784ea9877edf71c96229fdd0c29c281eaa41
                          • Opcode Fuzzy Hash: d09d7bbbbed21704cfcfd05ad7500aad5fc57f30abe4b9fb1f51d63267c4621c
                          • Instruction Fuzzy Hash: 85D17FA5B0AB9785FB528F61D460BB923A2AF48B84F444135CE2D57BE9EF3CE505C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Lockit_invalid_parameter_noinfo_noreturnstd::_$CloseLockit::_Lockit::~_MessageSendSetgloballocaleTimeoutstd::locale::_
                          • String ID: GPUs:$ version $2$205.22$Bottom$Displays:$Left$NVIDIA RTX Desktop Manager$Right$Software\NVIDIA Corporation\Global\nView$Software\NVIDIA Corporation\Global\nView\WindowRect$Top$WindowRect$driver version $os: $osTag
                          • API String ID: 3304796370-1363665941
                          • Opcode ID: 0a10524fb1272b94fb291a584150af6e89b44a10d7abaca0b5ee1a8cb5dbf160
                          • Instruction ID: ac6153b25a3062b40866a6c833e9715d2d8a63a1c3ff57e98ac0004f2765581e
                          • Opcode Fuzzy Hash: 0a10524fb1272b94fb291a584150af6e89b44a10d7abaca0b5ee1a8cb5dbf160
                          • Instruction Fuzzy Hash: 7B229F72B1AB8785EB018F64D4606A967A1FB84BD8F544136EA9D07BEEDF3CE040C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Process$CloseEnumHandleOpenToken$ActiveBaseConsoleDuplicateModuleModulesNameProcessesSessionValue_invalid_parameter_noinfo_noreturn
                          • String ID: Shell$Software\Microsoft\Windows NT\CurrentVersion\Winlogon$vector too long
                          • API String ID: 1446407951-1940046086
                          • Opcode ID: d41c97a93e5cd1837abc3fa556a7b24cdb74e75b0d1d46294a661ddf68452fbc
                          • Instruction ID: d9f701ca182565a7facbb8c4d489129ce9dd0f19f6739d669af6624823290d5e
                          • Opcode Fuzzy Hash: d41c97a93e5cd1837abc3fa556a7b24cdb74e75b0d1d46294a661ddf68452fbc
                          • Instruction Fuzzy Hash: 3061B57271AB8385EB11DB25E854AAA6760EB887A0F540335DA7C43BEDDF3CD545C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                          • String ID: E"fY
                          • API String ID: 4099253644-93874851
                          • Opcode ID: c236f47fa00f1eb095f464021b61fc5b1928e1c18c896dc44bc4746b0c097f4e
                          • Instruction ID: e2653a9f16c68cd9db8ac6c19f3406fb9b710f8bb8de90df47967776b1696018
                          • Opcode Fuzzy Hash: c236f47fa00f1eb095f464021b61fc5b1928e1c18c896dc44bc4746b0c097f4e
                          • Instruction Fuzzy Hash: 6B314E31601A4C89FED7DB11E9613E563A0BB4D7D4F19C226BA190AAE5DFBCC68D8301
                          APIs
                          Strings
                          • hwnd(0x%08x) class(%s) rootOwner(%i) child(%i) pop(%i) vis(%i) cap(%i) thick(%i) max(%i) rect(%i) parent(vis(%i) rect(%i)), xrefs: 00007FFDFB507D52
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Rect$ClientEmptyLongWindow$AncestorClassNameParent
                          • String ID: hwnd(0x%08x) class(%s) rootOwner(%i) child(%i) pop(%i) vis(%i) cap(%i) thick(%i) max(%i) rect(%i) parent(vis(%i) rect(%i))
                          • API String ID: 1814797616-3427189458
                          • Opcode ID: 74a99a62fac07763e797a5255ed2ad9a0e80ffb0614fd098865b18a1db196fb4
                          • Instruction ID: 9b3cd75de28bc16f0f7032089fab91d2720cd28dce32806d56c76a539b34302c
                          • Opcode Fuzzy Hash: 74a99a62fac07763e797a5255ed2ad9a0e80ffb0614fd098865b18a1db196fb4
                          • Instruction Fuzzy Hash: 8141956271A7C686EB218F26F85079BB760FB88B94F484125DE9D43BA9DF3CD144CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Process$CloseEnumHandleOpenToken$ActiveBaseConsoleDuplicateModuleModulesNameProcessesSessionValue_invalid_parameter_noinfo_noreturn
                          • String ID: Shell$Software\Microsoft\Windows NT\CurrentVersion\Winlogon
                          • API String ID: 1446407951-2454539505
                          • Opcode ID: 5bdaef2c39089f75fa48d7c9970810c087d07c4f83131bfedaa235a0de9c1b38
                          • Instruction ID: 41038074cf623b2f4ce8acf3acd1582b7d49c63df1f90bdfeef66bde51b7f642
                          • Opcode Fuzzy Hash: 5bdaef2c39089f75fa48d7c9970810c087d07c4f83131bfedaa235a0de9c1b38
                          • Instruction Fuzzy Hash: B141B572719B8385EB11DF25E450AAA6360FB89790F540236EAAC43BEDDF3CD545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: free$setlocalestd::_$Locinfo::_$ErrorFreeGetcvtHeapLastLocinfo_ctorLocinfo_dtorLockitLockit::____lc_codepage_func___lc_locale_name_func___mb_cur_max_func_errno_lock
                          • String ID:
                          • API String ID: 3682056076-0
                          • Opcode ID: ca3fb0b8572f38f04c8e7f887ed93a46820372b37fb06955fdddff351c3b93c0
                          • Instruction ID: 0d852a346218120d3da4cb41429ba606f2c3b38bf25389faa73f1b0c9af31080
                          • Opcode Fuzzy Hash: ca3fb0b8572f38f04c8e7f887ed93a46820372b37fb06955fdddff351c3b93c0
                          • Instruction Fuzzy Hash: 87416B32B45B8889EB52DBB4D4503DC33B9AB687C8F05811AAA4927A9ADE70C659C340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo
                          • String ID: -$:$f$p$p
                          • API String ID: 3215553584-2013873522
                          • Opcode ID: de602ac8ff022a4ff53410ae60c26684bfbecfd39bdf7640684e28d1363bd85f
                          • Instruction ID: c98b2231a8135b74659868d65be428774842ad41713f097f4a1bc9f26df9b95b
                          • Opcode Fuzzy Hash: de602ac8ff022a4ff53410ae60c26684bfbecfd39bdf7640684e28d1363bd85f
                          • Instruction Fuzzy Hash: F812C372F0E95386FB625A14E064A7976A1FB40750FC4C539E6A9077EEDF3CE8848B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: CriticalSection$Initialize$Leave$EnterFreeLibrary
                          • String ID:
                          • API String ID: 3518392267-0
                          • Opcode ID: 23329b1970a4fbed670d33c2c2c16f4f298de89f17d4aed16765008b6f957f1c
                          • Instruction ID: 3b33fb1fd534c229c74f296336eb2a92809c82ff1d474751541a0189f95e86af
                          • Opcode Fuzzy Hash: 23329b1970a4fbed670d33c2c2c16f4f298de89f17d4aed16765008b6f957f1c
                          • Instruction Fuzzy Hash: 0141A570F0EA43D6FBA19B50EA74B7827A0AF64314F840175C46D8A6FDDF6CAA49C640
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3320480354-3145022300
                          • Opcode ID: 1518c0a335d86cbaa4542f68ea49f77159dfa4c437a71da536b0f71a588ef4d3
                          • Instruction ID: 903a1047ac448027b450ec25c1a64425b0a144e6aa285fcf7086c7a1e7952437
                          • Opcode Fuzzy Hash: 1518c0a335d86cbaa4542f68ea49f77159dfa4c437a71da536b0f71a588ef4d3
                          • Instruction Fuzzy Hash: 87313D31604A8881FA97DB15E4503D97761F799BE0F58C222FA6E176E9DF38C68AC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: 72116e41904cd7165d87d3b7b8d6bb6200793e546d858aed617fd641d52c83dc
                          • Instruction ID: 703a4cad84fdcc045a2871730030fa27516cb42ee1b9283c4040bcabb6153e8b
                          • Opcode Fuzzy Hash: 72116e41904cd7165d87d3b7b8d6bb6200793e546d858aed617fd641d52c83dc
                          • Instruction Fuzzy Hash: 50312331604A4881EAA6DB15E4503E97760F798BE4F648322F66D17BE6DF38C68DD700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 6d24588b9a7590b3b87b70300c70b3292790a8bd1c5b1071349b1aa35c1d1e7e
                          • Instruction ID: ac250751d58bdd5496b533042141eb838cccab87bb5e4a6a326be43682a2c53b
                          • Opcode Fuzzy Hash: 6d24588b9a7590b3b87b70300c70b3292790a8bd1c5b1071349b1aa35c1d1e7e
                          • Instruction Fuzzy Hash: F5312E72604A4891EAA6DB15E4407E97760B79CBE0F148322FA6D13BA5DF28C68AD700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 0e8088bbc94c94de44c6ead9a77a8b98552ca770167b247603108ec63001514d
                          • Instruction ID: 35d3f142cde19c3a048b0fcb9483086a618d1f742b40768914a1a8e34770720a
                          • Opcode Fuzzy Hash: 0e8088bbc94c94de44c6ead9a77a8b98552ca770167b247603108ec63001514d
                          • Instruction Fuzzy Hash: 2E314131604B4891FA93DB15E8503D973A5FB987E0F588321FAAD076E5DE38C68E9700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3240839640-3145022300
                          • Opcode ID: dd54ca0da77a0209b6aeec4e3b00398d8d0106adb950ddbf77bc546178640126
                          • Instruction ID: c2a974b2d7a60a2b086a420e70802605e61706e16da007e4f81136d50c598c2d
                          • Opcode Fuzzy Hash: dd54ca0da77a0209b6aeec4e3b00398d8d0106adb950ddbf77bc546178640126
                          • Instruction Fuzzy Hash: 15316F72605A4C81FAD7DB15E4413D96361F79CBE0F548226FA9D076E5DE38CA8DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: c72775a103d99b6f837bcf2226a3accdb6696da6bb77df867dd2bc43998cf69d
                          • Instruction ID: 32bc1acb226f066091d62a6c54883872f8d60ae5ef2b5e81e47e51f18fae378c
                          • Opcode Fuzzy Hash: c72775a103d99b6f837bcf2226a3accdb6696da6bb77df867dd2bc43998cf69d
                          • Instruction Fuzzy Hash: 62314F32604A8881FAD6DB15E4403D97761F79DBE0F148222F66D636E5DE38C78DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: db4531463fb4ed7b9e84e20dd1357846afa3d7ca33d6adf5fa5f8d6b27529a5f
                          • Instruction ID: b0aa7ca52775649b56220f307fd84676fe4e09e30895342a551203fcddcd03a4
                          • Opcode Fuzzy Hash: db4531463fb4ed7b9e84e20dd1357846afa3d7ca33d6adf5fa5f8d6b27529a5f
                          • Instruction Fuzzy Hash: 67313036604A4881EAA6DB15E4503E97760F79C7E0F548322FA6D03BE9DE38C68EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 4068408745-3145022300
                          • Opcode ID: ee33bc0723efa5aa4c366d82e68c788871106819f50c989c870ed83f44bc0ef7
                          • Instruction ID: 0ed4759d308908f78153d5154aa8bc73361bf9988d8352dbe00c3883d08f4416
                          • Opcode Fuzzy Hash: ee33bc0723efa5aa4c366d82e68c788871106819f50c989c870ed83f44bc0ef7
                          • Instruction Fuzzy Hash: 84315271704B4881EAA2DB15E4407E97760E79DBE4F148221FA6D17BE9DF38C68EC701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 0d872b1ba248602230f18a3585586ef29a0b918caca146d4684eaa2802e5b407
                          • Instruction ID: ba173e527248ad616717990ad57c3ea3ffa836c4fcce1a36eb2f310dd1d629a6
                          • Opcode Fuzzy Hash: 0d872b1ba248602230f18a3585586ef29a0b918caca146d4684eaa2802e5b407
                          • Instruction Fuzzy Hash: A5313E31605F4881EA92DB15E4443D977A1FB98BE0F548221FAAD176E9DF38C68ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 6042c083aaf9d19d0e0f3061719a0287c51729f22326b78e9f0788faf9e04fe2
                          • Instruction ID: 8bbbb137a0339c4dc54c9029d106e5257286d05d285556903a5a2b1fb779c90b
                          • Opcode Fuzzy Hash: 6042c083aaf9d19d0e0f3061719a0287c51729f22326b78e9f0788faf9e04fe2
                          • Instruction Fuzzy Hash: 88316171604A4881EA97DB15E4513D96760F79CBE0F148322F76D136E5DF38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 32b660dc0e0ff8b2840d4f21ec67105e4c0f753b12f06fb9ea139e048b570729
                          • Instruction ID: 0e6cdc202ab0faf405a73aae82ebcdbb06b13299b5b79274f84cc1b9637a6d3e
                          • Opcode Fuzzy Hash: 32b660dc0e0ff8b2840d4f21ec67105e4c0f753b12f06fb9ea139e048b570729
                          • Instruction Fuzzy Hash: 0C315071704B8881FA96DB15E4403DA7361F79DBE0F148222BA6E176E5DF38D68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: 5c641469a2d30daa8160390feef35362dee9b3f3e43551c59d405e4c7c364bf2
                          • Instruction ID: 85f0ddc1fb455183e8826907cb9b5ce322fb28c6acbd3a1f7897a95eead57acb
                          • Opcode Fuzzy Hash: 5c641469a2d30daa8160390feef35362dee9b3f3e43551c59d405e4c7c364bf2
                          • Instruction Fuzzy Hash: 89313032604A4882EAA6DB15E4503E97361E798BE0F548221FA6D437E5DF78C78E9700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 4068408745-3145022300
                          • Opcode ID: ae0ea46a9ee9c3e86daeac0d3234f15b2964b553704b4edd4ab6e31ed39ad8f6
                          • Instruction ID: 29293d91807841274312c0898b4eab7eb0361c7ebc024cff1c6093db3a856592
                          • Opcode Fuzzy Hash: ae0ea46a9ee9c3e86daeac0d3234f15b2964b553704b4edd4ab6e31ed39ad8f6
                          • Instruction Fuzzy Hash: 7E313071604A4881FAA7DB15E4507E97361E79CBE0F148221FA6E137E9DF38C68ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 4068408745-3145022300
                          • Opcode ID: c202a5770c39ab57ed84ceb3e68100b3a73b5e5cfc957b9efda8ad8bf9c3945a
                          • Instruction ID: 93b7f2e2961d43802aa01675c6e34dc0c733fb271d42efec73ddf7d9136c2f33
                          • Opcode Fuzzy Hash: c202a5770c39ab57ed84ceb3e68100b3a73b5e5cfc957b9efda8ad8bf9c3945a
                          • Instruction Fuzzy Hash: F2314F31605A4881FA96DB15E4507DA77A1FB98BE0F148321FAAE036E5DE38C78ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 7c5417a85a408d482a06928c82b709df55114473f0ba7bb4651cdaf59540ff60
                          • Instruction ID: 75f7d5b72cde2ed98477708e3d1a4d82b3ea81c6c5906bfc7a9d9a34f9766923
                          • Opcode Fuzzy Hash: 7c5417a85a408d482a06928c82b709df55114473f0ba7bb4651cdaf59540ff60
                          • Instruction Fuzzy Hash: 0E315071604A4C81FAA7DB15E4513E96760F79CBE0F64C322BA5E176E5DE38C68EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 51d939a1685a2bea652c7bde2fffae8489b2ff6d25f45c1629a8571a2a082665
                          • Instruction ID: 011b7c4e06debffad8918965d35e9ac5ee19e89f5e81af284a0d200ba2a5a2d3
                          • Opcode Fuzzy Hash: 51d939a1685a2bea652c7bde2fffae8489b2ff6d25f45c1629a8571a2a082665
                          • Instruction Fuzzy Hash: 96316132604A8C81FA96DB15E4407D97761F799BE0F14C222FA6E236E5DF39C68EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: 13f34df5b8dca6365bf56936fc197be976fcfd57eef588af3eb235ac7314212c
                          • Instruction ID: af194abc5343017d69ccae0d00c3f84e880894c87c78bc69f84cbf70def1933b
                          • Opcode Fuzzy Hash: 13f34df5b8dca6365bf56936fc197be976fcfd57eef588af3eb235ac7314212c
                          • Instruction Fuzzy Hash: 45314331604A4881EAA6DB15E4503EA7760F79CBE4F548222FA6D177E5DF38C68ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcodecvtstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 2666907392-3145022300
                          • Opcode ID: c388285eeef8162b9337bba61029a55adadbbccc6a3321af76d71b019ff4cab9
                          • Instruction ID: 9f8509df617fee80e8d8dfa9a623ec6440d9e8a68142cbaf352e872acf36d8d2
                          • Opcode Fuzzy Hash: c388285eeef8162b9337bba61029a55adadbbccc6a3321af76d71b019ff4cab9
                          • Instruction Fuzzy Hash: 18316131604E8881EA97DB15E8403D97761E79DBE4F548222FAAD136E5DE38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 480e9808ded4dd9ce93b9611af4d871cbfd108c73a0c2514d78019fd0e2b9d8d
                          • Instruction ID: d9abbdc1c59c89ecb922db9c6cf2075237f80f35d562cec5bde8faddb7bf7778
                          • Opcode Fuzzy Hash: 480e9808ded4dd9ce93b9611af4d871cbfd108c73a0c2514d78019fd0e2b9d8d
                          • Instruction Fuzzy Hash: A5315271604A4881EAA3DB15F4413D96761F79CBE0F548322FA6D076E9DF38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: cc7960cd80689731206c88487c0de69d9e60d2192e2557925d807d75d2f5c5e1
                          • Instruction ID: 7e9a7ef3db8d0513497969ea559276415be1bfe1d386d7b59b03975b12a9fb17
                          • Opcode Fuzzy Hash: cc7960cd80689731206c88487c0de69d9e60d2192e2557925d807d75d2f5c5e1
                          • Instruction Fuzzy Hash: 7D316F32604A8882EA96DB15E8503D97761F798BE0F64C322FA6D176E5DF38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 3587b487d705abe092835c4f5a3cb7e3f979531b66054bbeb9aa7d553986a25e
                          • Instruction ID: 6d09809d2825c675cc3354ec29be6d882d9351c6da2981936af5edb680e291e5
                          • Opcode Fuzzy Hash: 3587b487d705abe092835c4f5a3cb7e3f979531b66054bbeb9aa7d553986a25e
                          • Instruction Fuzzy Hash: 7A316132604B4881EAA6DB15E8403E97760F79CBE0F548222FA5D037E9DF39C68ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3240839640-3145022300
                          • Opcode ID: eda171fb9a849b4f616c3e08da64b58d4c66e3ddf2523fe25397e19311bc49a1
                          • Instruction ID: 71537928979aec7902da3243a871980667c4c30672dd1b9dca4b0184ee6d3b67
                          • Opcode Fuzzy Hash: eda171fb9a849b4f616c3e08da64b58d4c66e3ddf2523fe25397e19311bc49a1
                          • Instruction Fuzzy Hash: 36313E72605A8881FA96DB15E4403D97361F7A9BE0F188222FA6D636E5DF39C68D8700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: 6d32b28b6ca3663ff3abfb41e9471f4c917f2c1054da530c376a0520937a3486
                          • Instruction ID: b60f097be7739bb6dc934a6eb27d4ad299f47afb1e08747a93c7bf12596e6123
                          • Opcode Fuzzy Hash: 6d32b28b6ca3663ff3abfb41e9471f4c917f2c1054da530c376a0520937a3486
                          • Instruction Fuzzy Hash: 7F316C72604A4981EE93DB19E4513D96760F79CBE0F158322BA6E076E5DF38CA8EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 9a938acf533d3934332a6247e24f5e54ece76f8414f260b4929eae246823290b
                          • Instruction ID: 114c17726efd3ac1399dd98c0993eddc8de426ae5a52da213f0347ec5244437b
                          • Opcode Fuzzy Hash: 9a938acf533d3934332a6247e24f5e54ece76f8414f260b4929eae246823290b
                          • Instruction Fuzzy Hash: 55314132604B8C81EA96DB15E8403D97761F79DBE0F14C222F66D236E6DE38CA8DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 96317be4258d393e0a29fd177015503871ef1b8472f330f26a4596696f7ded08
                          • Instruction ID: d5a0afbf97bf32ff6c3350b5f01d45652f3842558bd94ec47325ba3e195b39a4
                          • Opcode Fuzzy Hash: 96317be4258d393e0a29fd177015503871ef1b8472f330f26a4596696f7ded08
                          • Instruction Fuzzy Hash: E0314132604A4C91EAA7DB15E4503E97760F7987E0F148222F6AD13BE9DF39C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: e5bc7bed0252b8b1eac2afdacdede538a10b35561d0a981faa6039916fcc0b90
                          • Instruction ID: fcae424b2c24524ac6a2dc0f7b7d658d6964671266eecf1fc0c25137e3d741c2
                          • Opcode Fuzzy Hash: e5bc7bed0252b8b1eac2afdacdede538a10b35561d0a981faa6039916fcc0b90
                          • Instruction Fuzzy Hash: 77313E31704B4981EA93DB15E4407E97361E7AC7E0F18C321FA6D176E6DE38CA8E8700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3240839640-3145022300
                          • Opcode ID: 82d6dfd595e0919862318aaa4c0101f1d4fe4afb7754d539f957bde6888f6d2a
                          • Instruction ID: f8ae8055f2c2bb27548f621051a3e9b0c7ecbe39d78b1a5e4a20972fbb614263
                          • Opcode Fuzzy Hash: 82d6dfd595e0919862318aaa4c0101f1d4fe4afb7754d539f957bde6888f6d2a
                          • Instruction Fuzzy Hash: 14313272608A8881FA96DB25E8403D97761F79DBE0F548322F66D176E5DF38C68EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3809448442-3145022300
                          • Opcode ID: 468e8583f91d548cbd29b93b68de9fe69da34fbf07c94fac8ff66319a34d3499
                          • Instruction ID: 86d7a962d46641e92d15d66fca1501ef3728ada81f482cdfd9b3151a9865967a
                          • Opcode Fuzzy Hash: 468e8583f91d548cbd29b93b68de9fe69da34fbf07c94fac8ff66319a34d3499
                          • Instruction Fuzzy Hash: 7F316F72A04A4C81FAD7DB15E5413D96361F79CBE0F148222FA5D076E5DE38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: a97d4a0103f654b4b20c800e4f62322db3453708dd72828d55e479ce89410c5e
                          • Instruction ID: f3f19d9c217fac931ce927225a4939fad5f6d9221ff3f3f816bb9e389d9f9663
                          • Opcode Fuzzy Hash: a97d4a0103f654b4b20c800e4f62322db3453708dd72828d55e479ce89410c5e
                          • Instruction Fuzzy Hash: 7C316171604B4D81FA96DB15E4403E97761E79CBE0F64C222BA6E177E6DE38CA8DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 620047600-3145022300
                          • Opcode ID: 8e5fefe93561a59ad46ce85a37caf660d85c16939c4905db0fbb578ad49114bb
                          • Instruction ID: 96f0fb2c830b6a1955649fbd0b773edd4971c9b10982643f56ec6eb2397e4fe1
                          • Opcode Fuzzy Hash: 8e5fefe93561a59ad46ce85a37caf660d85c16939c4905db0fbb578ad49114bb
                          • Instruction Fuzzy Hash: A5313F32604B4881EAA6DB15E4403E97760F798BE4F64C322BA5D037E9DF38C68ED700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 3320480354-3145022300
                          • Opcode ID: 917c673cf237d7768db5174921dcc6ae41103a5902e4674f2ebf9e3ddd9a3165
                          • Instruction ID: 2949d1dbb2558bb8b0e553727a052f62747b73423eec58154c0806c570db14de
                          • Opcode Fuzzy Hash: 917c673cf237d7768db5174921dcc6ae41103a5902e4674f2ebf9e3ddd9a3165
                          • Instruction Fuzzy Hash: 70311D31604A4C81EA97DB15E8513D977A1FB98BE0F148322FAAD076E5DF39C68E9700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast$ios_base::badbit set
                          • API String ID: 1776536810-182444483
                          • Opcode ID: 1f1de01e030e88115448670c1250ec0f749da08e23ff95ccc15e6e7bba8c242b
                          • Instruction ID: 3155b743d34470ed5679d7b64c3638ca01dfa7372a6c5b669332cd991d85d7a9
                          • Opcode Fuzzy Hash: 1f1de01e030e88115448670c1250ec0f749da08e23ff95ccc15e6e7bba8c242b
                          • Instruction Fuzzy Hash: FD315D35600B4881EA97DB15E5403D97361E798BE0F58D222FA6E177F9DE38C68EC701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: CloseProcess$Handle$CreateCurrentObjectOpenQuerySingleValueWaitWow64
                          • String ID: %s\%s %s$h$nViewMain64.exe
                          • API String ID: 563726375-2808350667
                          • Opcode ID: 454a5909347dd663a7aff94882edc13ab49f069e81745075fcd0f01081e62d5a
                          • Instruction ID: 35ba8089f51cfcbf7a2d3a5077a4072eb7a20a01c05f777cad34c6391ff58fa9
                          • Opcode Fuzzy Hash: 454a5909347dd663a7aff94882edc13ab49f069e81745075fcd0f01081e62d5a
                          • Instruction Fuzzy Hash: 57315423A19BC282E761CB20E8517ABB3A1FBD9344F445235D6DD42BAADF7CD155CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: free$Sleep_malloc_crtmalloc
                          • String ID:
                          • API String ID: 2523592665-0
                          • Opcode ID: 3fbd0b3e35addabc098f64ab091990d7b6a2871f8ac9e4cce4e35d3e8861d74a
                          • Instruction ID: fc16e1660138297f9bb3e8678e6c16cd315b57137c63fc5872edf9e7c8194a9d
                          • Opcode Fuzzy Hash: 3fbd0b3e35addabc098f64ab091990d7b6a2871f8ac9e4cce4e35d3e8861d74a
                          • Instruction Fuzzy Hash: 30619F32301B4892EBA3DB16E94139A73A0F78CBD8F058125AF4D47B51DF78C66AC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrowstd::exception::exception$Xbad_allocstd::_
                          • String ID: bad conversion$string too long
                          • API String ID: 1519488521-500853860
                          • Opcode ID: bf6df7041d4449f49d10bdcf2d7bbb40e5c4d876ee2b76c3840bffa6f91f8fdb
                          • Instruction ID: fad14312ad47d1d51249c0a7a389eb41bb91f270e5ec6e02dd255712d111446d
                          • Opcode Fuzzy Hash: bf6df7041d4449f49d10bdcf2d7bbb40e5c4d876ee2b76c3840bffa6f91f8fdb
                          • Instruction Fuzzy Hash: D4D17B32704B88C9FB42CBA4E4503ED37B5F7497A8F948626EAA917AD5DF34C649C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                          • String ID:
                          • API String ID: 1573762532-0
                          • Opcode ID: 7b47a042eea3f3de49294c888d2e7f7195dfd9dc128bccc2e4caf73cebc8c57f
                          • Instruction ID: f2ef72c2d081a62da6ba206108f7190fcdc76fe894ca0d405d2fc84784ff5a10
                          • Opcode Fuzzy Hash: 7b47a042eea3f3de49294c888d2e7f7195dfd9dc128bccc2e4caf73cebc8c57f
                          • Instruction Fuzzy Hash: 50411677A01A9D81EBE69B1191C03F972A0F7487DDF9AC116FA845B6C4DF38C7498308
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                          • String ID:
                          • API String ID: 781512312-0
                          • Opcode ID: 1996f2f9ceac77ac49b72366ba56ab82fbc49c57b1b3130c14664040d3ec86e6
                          • Instruction ID: 8ce04cb9124dd54c6d4ddcc2c6da84841e497bcc28cebf8c8d46b4611f73f4df
                          • Opcode Fuzzy Hash: 1996f2f9ceac77ac49b72366ba56ab82fbc49c57b1b3130c14664040d3ec86e6
                          • Instruction Fuzzy Hash: 28415B72A106E881EBE3AB1180513FE33E0E359BE4F96C225B794076C5EF28CB59C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: ab939dc476349fa0fdaab308a684cfe4368de580aaf06aec8b938b68da6e425a
                          • Instruction ID: e37e8b3caca8d6a150532a67f206124a5a8e0b77ae31ba5b87879bce6c6f3b3a
                          • Opcode Fuzzy Hash: ab939dc476349fa0fdaab308a684cfe4368de580aaf06aec8b938b68da6e425a
                          • Instruction Fuzzy Hash: E5314172604A4981EA97DB15E4907D97760E79CBE0F548222BA6D0B7E9DE38C6CDC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: 10cc8910cc85584bd4a3460428c8224b28d9867b334426348c47967f8e79c69e
                          • Instruction ID: 5280669f5cee9c1c10b6307b5616e8497b2b20f45e6c0148fb90ff969be6db11
                          • Opcode Fuzzy Hash: 10cc8910cc85584bd4a3460428c8224b28d9867b334426348c47967f8e79c69e
                          • Instruction Fuzzy Hash: AD315432604A4881EA97DB15E4403D96761F7987E0F549322FA5E576E5DF38CA8DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: 62fdf57a96092745c62a34c7ea652cdc8cbd8a8d616748e806eab291326f5f4d
                          • Instruction ID: 651fb656c3f290362de763b1ee359234d87ce794770dba1f6b2753c03b7c62f2
                          • Opcode Fuzzy Hash: 62fdf57a96092745c62a34c7ea652cdc8cbd8a8d616748e806eab291326f5f4d
                          • Instruction Fuzzy Hash: 3F315232604A4D81FAA6DB15E5417E97361F7987E0F148222BA6D077E5DF38CA8EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: e9c222ff3a7390eeb7995fd0964985c14573391c4c93fb8924965464058be729
                          • Instruction ID: 6ee744d50b30d82c78f3f63e2e17a70b14ef85af489d316716f56745e473c8ac
                          • Opcode Fuzzy Hash: e9c222ff3a7390eeb7995fd0964985c14573391c4c93fb8924965464058be729
                          • Instruction Fuzzy Hash: 50315232604A4C85EAA2DB15E8403E97761F79CBE0F548222F65D077E6DF38C68DC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: 7ebc46492d4dac5414eace0dc4bc23cdeb242ea3acaa4deefd90ef76b8116496
                          • Instruction ID: ec51a6cea0b166713f805a236551c1283cd08e0c28255429b56f9ce5f8cbadc2
                          • Opcode Fuzzy Hash: 7ebc46492d4dac5414eace0dc4bc23cdeb242ea3acaa4deefd90ef76b8116496
                          • Instruction Fuzzy Hash: 76316132604B4981EAA6DB15E4407E97760F799BE4F648231F66D077E5DE38C78EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: 9261657b17084aba6423a854777eb8a9a4c09b6e3969408025c508acd221764b
                          • Instruction ID: ba7f2a953198e62413a15f720fea67b0a98ff4fd57fa2979048f6802ea0a1aa0
                          • Opcode Fuzzy Hash: 9261657b17084aba6423a854777eb8a9a4c09b6e3969408025c508acd221764b
                          • Instruction Fuzzy Hash: 0D313031604E4882FB97DB15E8403D96361F79CBE0F288322B69D176E5DE79DA8EC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                          • String ID: bad cast
                          • API String ID: 1776536810-3145022300
                          • Opcode ID: 0ac0953fd19857d648c264f06a73748a9098f24d820f7a16771c37c3a699e4c5
                          • Instruction ID: 5c309b77fee12f51d110db927d2fe456d8342975b36495e84ceae0cc68268f47
                          • Opcode Fuzzy Hash: 0ac0953fd19857d648c264f06a73748a9098f24d820f7a16771c37c3a699e4c5
                          • Instruction Fuzzy Hash: 33315031700A4881FA96DB15E4407D97761E7A8BE0F58C321FA6D036E6DE38C68EC740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                          • String ID:
                          • API String ID: 3191669884-0
                          • Opcode ID: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                          • Instruction ID: 4b6da2c887b896db48c8bf2af78125f2489fc4292198535c1cc227c838a58a5b
                          • Opcode Fuzzy Hash: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                          • Instruction Fuzzy Hash: 2B31CC72704B888AE6A39B5190847EDB7A4F348BE4F668125FE5803B96CF74CA49C704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 432778473-1866435925
                          • Opcode ID: c4755da1f0456530d0fa2dca688d121101a445544884d577615891b101f1b86f
                          • Instruction ID: a05f63984e831ba9eb21b9b46173f67e56e275c27f518e2d554fe2b11f73e329
                          • Opcode Fuzzy Hash: c4755da1f0456530d0fa2dca688d121101a445544884d577615891b101f1b86f
                          • Instruction Fuzzy Hash: 80215E71A11B5D99FB92DB64E8813EC3374B718388F908126F94922A69EF35C74EC340
                          APIs
                            • Part of subcall function 00007FFDFB50D460: CreateMutexW.KERNEL32 ref: 00007FFDFB50D49A
                            • Part of subcall function 00007FFDFB50D460: GetLastError.KERNEL32 ref: 00007FFDFB50D4A8
                            • Part of subcall function 00007FFDFB50D460: WaitForSingleObject.KERNEL32 ref: 00007FFDFB50D4BD
                            • Part of subcall function 00007FFDFB505ED0: RegOpenCurrentUser.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFB4EEA7C), ref: 00007FFDFB505F11
                            • Part of subcall function 00007FFDFB505ED0: RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFB4EEA7C), ref: 00007FFDFB505F45
                            • Part of subcall function 00007FFDFB505ED0: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFB4EEA7C), ref: 00007FFDFB505F52
                          • RegCloseKey.ADVAPI32 ref: 00007FFDFB50DA6A
                          • RegCloseKey.ADVAPI32 ref: 00007FFDFB50DABD
                            • Part of subcall function 00007FFDFB506490: RegSetValueExW.ADVAPI32 ref: 00007FFDFB5064B4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Close$Create$CurrentErrorLastMutexObjectOpenSingleUserValueWait
                          • String ID: Software\NVIDIA Corporation\Global\nView$Software\NVIDIA Corporation\Global\nViewInstalled$nViewAutoRun$nViewNextLoaded
                          • API String ID: 1572674430-972942980
                          • Opcode ID: 2b53140f13742c1fceefd5b7d1b197221aff8bbbbadfeb63a278f3f936b43a1b
                          • Instruction ID: 4d5b2abb71fdb52bf170fdf19310236c52991e9cf2fe03a3d4a6bd709bc5b117
                          • Opcode Fuzzy Hash: 2b53140f13742c1fceefd5b7d1b197221aff8bbbbadfeb63a278f3f936b43a1b
                          • Instruction Fuzzy Hash: 63111C31B1A64781EB129B11E860B7A6760FB84788F484131DAAD47BFEDF6DE909C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_errnosetlocalestd::_
                          • String ID:
                          • API String ID: 1855319098-0
                          • Opcode ID: 2f9469f7e86d9ed662453ed7390a40d8cb98c28b94d45fdd9a0046f49d435607
                          • Instruction ID: b48272a0fe48caf80c68cbfff6fe37b1983f1ac57bfd09bfec3c9c3905106cea
                          • Opcode Fuzzy Hash: 2f9469f7e86d9ed662453ed7390a40d8cb98c28b94d45fdd9a0046f49d435607
                          • Instruction Fuzzy Hash: 85010831202A9888EF9FDF65D5917EC73A4EF59FC8F188116BA4906A86CE64CD94C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _getptd
                          • String ID: MOC$RCC$csm
                          • API String ID: 3186804695-2671469338
                          • Opcode ID: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                          • Instruction ID: cee1693f68b0781dadb7962070319637af549046bf3e62ebc375f9a8a227fa41
                          • Opcode Fuzzy Hash: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                          • Instruction Fuzzy Hash: 6DF0303550814CCAE6DB2B5484053FF2790EB9DB87F8BC1A2A30082382CFBC47989B57
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrow$LockitLockit::_std::_
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 1691487403-1866435925
                          • Opcode ID: 0db30ec67b73ccdcabdd15c275040f157008ca9554cbf0563cdfb27b905dc0a0
                          • Instruction ID: 767f78a192eeebaa216b8aed547a68a7fb289aba9e2ffc4a09429269e94dafed
                          • Opcode Fuzzy Hash: 0db30ec67b73ccdcabdd15c275040f157008ca9554cbf0563cdfb27b905dc0a0
                          • Instruction Fuzzy Hash: 22C17372600B49C5EBA6CF19E0903A9B7A1F788BD4F50C522EB4D437A5DF7AC64AC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 432778473-1866435925
                          • Opcode ID: 8d1da8b0088b82ce8472ecfb309f3f6d6294f4c20df7e85d44d77dd3078eb974
                          • Instruction ID: a8b4bdf90a1f4ad9093596da8dc1c2238f82fb5394a2230a05445288838e8596
                          • Opcode Fuzzy Hash: 8d1da8b0088b82ce8472ecfb309f3f6d6294f4c20df7e85d44d77dd3078eb974
                          • Instruction Fuzzy Hash: B2A15672605B4885EBA6CF19D0903AD77A1F788BC4F50C512EA8E437B5DF3AC68AC700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                          • String ID:
                          • API String ID: 2081738530-0
                          • Opcode ID: 37271f0760c40865950aeb79783db2491e3a86690c86196550daa4963bca67e8
                          • Instruction ID: 2c874dc7b171e7337f0bcb1188684047adad128c304e989030157359734c8ccf
                          • Opcode Fuzzy Hash: 37271f0760c40865950aeb79783db2491e3a86690c86196550daa4963bca67e8
                          • Instruction Fuzzy Hash: 81318022B0AA8391EB169F55D560AB96760FF44B94F081531DB6D0B7FEDF2CE4418340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 432778473-1866435925
                          • Opcode ID: 13b14e47e50a117b45a7778c449b81f96b46451b12d824cac215d1e20a6c26ef
                          • Instruction ID: 749b6e3399a9a358d8b44ea8bf4972b4671ad478281f1e69b97e26da144d3d08
                          • Opcode Fuzzy Hash: 13b14e47e50a117b45a7778c449b81f96b46451b12d824cac215d1e20a6c26ef
                          • Instruction Fuzzy Hash: DF316472604A4891EAA2DB08E4913D973A0F79C7C4F508522F68D53AA6DF3DC74EC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ExceptionThrow
                          • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                          • API String ID: 432778473-1866435925
                          • Opcode ID: 9c7b1aa60feacb23789e46315638fef29d19575f7816bd3068f614c3fe862f5d
                          • Instruction ID: c8b34f633450288d0747754450d333132d257ba904ae0c0c3cccce57b6605a3c
                          • Opcode Fuzzy Hash: 9c7b1aa60feacb23789e46315638fef29d19575f7816bd3068f614c3fe862f5d
                          • Instruction Fuzzy Hash: EE316172615B8891EAA2CB14E4913D973A1F78C7C4F908522FA8D53B65DF39C74EC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: fgetwc
                          • String ID: string too long
                          • API String ID: 2948136663-2556327735
                          • Opcode ID: 2c54e6a053e8696a3d6b4ce687133d9b1274fd72c1f8f27c02397be768dd15f8
                          • Instruction ID: e9e8eae9dbfed57877077c82a3db96da082da43fa004c8d24fdad90a2db03b72
                          • Opcode Fuzzy Hash: 2c54e6a053e8696a3d6b4ce687133d9b1274fd72c1f8f27c02397be768dd15f8
                          • Instruction Fuzzy Hash: 00912873700A89D9EB62CF25C4903EC33A5F758798F918622EB1D47A99DF35CA68C314
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                          • String ID: :
                          • API String ID: 1584724053-336475711
                          • Opcode ID: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                          • Instruction ID: 6d0e94c2461dd84b0edd1b1838a9f5cfcbcc86ad0ff0a6976e9d1f2ec4836e13
                          • Opcode Fuzzy Hash: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                          • Instruction Fuzzy Hash: 5C41D032320B4881EB46DF26A8053DE63A5FB88BC4F4AD025EF5D4B785DE38D616C304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                          • String ID: :
                          • API String ID: 1584724053-336475711
                          • Opcode ID: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                          • Instruction ID: 3ed635f29bcd3bbc21113fbea3335e451753d90b531e1a175994c922d52f3f57
                          • Opcode Fuzzy Hash: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                          • Instruction Fuzzy Hash: 8441E03232074881EB46EF26A4453DE63A5FB49BC4F4AD025EF5D47785DE38D61AC304
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _getptd$ExceptionRaise_amsg_exit_getptd_noexit
                          • String ID: csm
                          • API String ID: 2951875022-1018135373
                          • Opcode ID: 19bc60ab7c8d46f879a577fdbd2134b4bea23403eb8b854014e227e093e25ad5
                          • Instruction ID: cbf58d6bb5dae3ded25f47af1c64b690f48564a0522dc2334fd63855ea109656
                          • Opcode Fuzzy Hash: 19bc60ab7c8d46f879a577fdbd2134b4bea23403eb8b854014e227e093e25ad5
                          • Instruction Fuzzy Hash: D52101362046888AE6B2DF56E0407EFB760F78DBA5F058216EF9943795CF38D689C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                          • String ID:
                          • API String ID: 2998201375-0
                          • Opcode ID: ce750271998e25300b2e646f02fc7aaebec70d68116cdf7c58e233941e4e38ee
                          • Instruction ID: 54a50374dbd1f0619f5f0edc3d7c0374764c2683045a736cdbb11a7d2bf11c8c
                          • Opcode Fuzzy Hash: ce750271998e25300b2e646f02fc7aaebec70d68116cdf7c58e233941e4e38ee
                          • Instruction Fuzzy Hash: D841E53221578486E7A38F15E1403AAB7A1FF99FC0F199165FB8857BD9CF38C6458700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _getptd$_inconsistency$DecodePointer_amsg_exit_getptd_noexit
                          • String ID:
                          • API String ID: 3669027769-0
                          • Opcode ID: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                          • Instruction ID: 484109b601cdb60bdd28eb5de1a6cf464c0836e84c8d7e2c0ed591a5095a7b89
                          • Opcode Fuzzy Hash: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                          • Instruction Fuzzy Hash: E5F0FE322086CCC1EAE7AB55D2413FD5350AB8DBC4F1DC171BB840738B9E20C6989315
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID:
                          • String ID: string too long
                          • API String ID: 0-2556327735
                          • Opcode ID: 4bcb7b9e46f5ff7cc52432c6c311dcb44bcc844c052dc368eac45e35e3a37bff
                          • Instruction ID: 445ab153e7c438d5d2aafa17d0e773ba3e554981103aaf2981c75933f28ac080
                          • Opcode Fuzzy Hash: 4bcb7b9e46f5ff7cc52432c6c311dcb44bcc844c052dc368eac45e35e3a37bff
                          • Instruction Fuzzy Hash: D0919D72310B8899EB56CF66C0417EC33A5F319B98F818922EB5D67B99DF34CA59C310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: FromString_invalid_parameter_noinfo_noreturn
                          • String ID: ($/
                          • API String ID: 4208966878-2468745909
                          • Opcode ID: e86f0ecaa3be94866e7fa5bfc826fc8b204ab50b5608c3affe33a1c089aea301
                          • Instruction ID: bc95cdd0d9e58d5cc78767b107e8a5aab22a1d03eed2e52c2dbf169855144b51
                          • Opcode Fuzzy Hash: e86f0ecaa3be94866e7fa5bfc826fc8b204ab50b5608c3affe33a1c089aea301
                          • Instruction Fuzzy Hash: 1651F362B19B8682EB119B20E550BAE7761FB85BD4F404231EBAD07BEADF3CD551C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                          • String ID: vector too long
                          • API String ID: 3936042273-2873823879
                          • Opcode ID: c3c7fdc940e69ba5ce45d1b963d3e03ddaf2e867e316d3fed9d6bbdb2af885f4
                          • Instruction ID: dc9422119852a6142468c3c9e726efdf84323f839515798818ec320f7bf4ecc8
                          • Opcode Fuzzy Hash: c3c7fdc940e69ba5ce45d1b963d3e03ddaf2e867e316d3fed9d6bbdb2af885f4
                          • Instruction Fuzzy Hash: 6921CE22B1BB8391EF589B25D5616783290AF08BE8F644730DA3D477EEDE2CD4908300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: MessagePost$Window
                          • String ID: #
                          • API String ID: 625243999-1885708031
                          • Opcode ID: ec91c7267931f0259de04be5352fd3fb5e5bf072d78545cdd5dd902155c6f963
                          • Instruction ID: 9dfcefc68500e6da824d021d18a499a7ace739b09eda56770bf46f6df6adc7c7
                          • Opcode Fuzzy Hash: ec91c7267931f0259de04be5352fd3fb5e5bf072d78545cdd5dd902155c6f963
                          • Instruction Fuzzy Hash: DC315E72B09B4286E7518F1AF450A69B360FB88BD4F480135DE9D43BAEDF6CD9458B00
                          APIs
                          • _callnewh.LIBCMT ref: 000000018002EF4E
                          • malloc.LIBCMT ref: 000000018002EF5A
                            • Part of subcall function 000000018002DA78: _FF_MSGBANNER.LIBCMT ref: 000000018002DAA8
                            • Part of subcall function 000000018002DA78: _NMSG_WRITE.LIBCMT ref: 000000018002DAB2
                            • Part of subcall function 000000018002DA78: HeapAlloc.KERNEL32(?,?,00000000,000000018002CDB6,?,?,00000001,000000018002CCA4,?,?,?,0000000180007B34), ref: 000000018002DACD
                            • Part of subcall function 000000018002DA78: _callnewh.LIBCMT ref: 000000018002DAE6
                            • Part of subcall function 000000018002DA78: _errno.LIBCMT ref: 000000018002DAF1
                            • Part of subcall function 000000018002DA78: _errno.LIBCMT ref: 000000018002DAFC
                          • _CxxThrowException.LIBCMT ref: 000000018002EFA3
                            • Part of subcall function 000000018002F788: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180007B51), ref: 000000018002F7F6
                            • Part of subcall function 000000018002F788: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180007B51), ref: 000000018002F835
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
                          • String ID: bad allocation
                          • API String ID: 1214304046-2104205924
                          • Opcode ID: 738ca98c6a90698db2108c0c022190bcd32b331751dc6fe347bc8814740b5120
                          • Instruction ID: c34e540c3145ef8f8a06282e5f5fd2721dda0450d804faa98ee3730b4d12842b
                          • Opcode Fuzzy Hash: 738ca98c6a90698db2108c0c022190bcd32b331751dc6fe347bc8814740b5120
                          • Instruction Fuzzy Hash: 3AF09AB1605B8E80EEA79B50A0517E95394E78D3C8F488025FA8D0B7A6EE39C34DCB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: strcspn$Mpunctlocaleconv
                          • String ID:
                          • API String ID: 2882554788-0
                          • Opcode ID: 58ecd130f00b09f8bef17f7d97753f2651f40aaaca60dedd1df9ae10203089cb
                          • Instruction ID: 98907bd55804cf440550a9984b5626c23124420e0867e0600be7f70ad20b48f8
                          • Opcode Fuzzy Hash: 58ecd130f00b09f8bef17f7d97753f2651f40aaaca60dedd1df9ae10203089cb
                          • Instruction Fuzzy Hash: DFE18E32B04E8889EB529F65C4413ED63B1FB4CB88F658115EE8D57B99DF78C64AC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: strcspn$Mpunctlocaleconv
                          • String ID:
                          • API String ID: 2882554788-0
                          • Opcode ID: 224329cea580c2bc9a473805bd80dcfbc8fe358384d0317fe36835c614ca270f
                          • Instruction ID: 0755191b1818215e47aef75f24144b8be0e7d395005ccb8dbfd754ea295aee4c
                          • Opcode Fuzzy Hash: 224329cea580c2bc9a473805bd80dcfbc8fe358384d0317fe36835c614ca270f
                          • Instruction Fuzzy Hash: 44E18E32B04E8889FB529FA5C4513ED63B1FB58B88F648115EE8D57B99DF78C24AC340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: strcspn$Mpunctlocaleconv
                          • String ID:
                          • API String ID: 2882554788-0
                          • Opcode ID: fce10359bc36b8c483969d2f07a480db227c72c73635d2d78eb5f884875fabf2
                          • Instruction ID: 7cedfd9f43536d940008849a18cc50f9a484f0cb7e860469d92b1f85863b93e9
                          • Opcode Fuzzy Hash: fce10359bc36b8c483969d2f07a480db227c72c73635d2d78eb5f884875fabf2
                          • Instruction Fuzzy Hash: 9DD15B32B05A8889EB52CBB5D4503DD37B1F749BC8F949115EE8967B8ADF38C24AC740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                          • String ID:
                          • API String ID: 1584724053-0
                          • Opcode ID: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                          • Instruction ID: 60c5c1db5c3b6a439df75705f13e8ee1368a37c7c8ec72173617ca3056aafd03
                          • Opcode Fuzzy Hash: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                          • Instruction Fuzzy Hash: F231C57271064886EB57DB26941539E67A1E789FC4F05C135EF5D0BB9ACF38D2068304
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _wfsopen$fclosefseek
                          • String ID:
                          • API String ID: 1261181034-0
                          • Opcode ID: 060668c88b56fe38f5c44a18ba7740774a474d3c0946bdb231730e3168279bf2
                          • Instruction ID: ca7f0c424757e16301a012df31de7f28ede8ce03464d2c668ee3546fdfd8efa6
                          • Opcode Fuzzy Hash: 060668c88b56fe38f5c44a18ba7740774a474d3c0946bdb231730e3168279bf2
                          • Instruction Fuzzy Hash: 6921E5327216C885FBE6CB1AD441BE67691A78CBC4F19C134BE0943B95DE35C60A8341
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                          • String ID:
                          • API String ID: 4151157258-0
                          • Opcode ID: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                          • Instruction ID: 9616a423f97e3a452b980222ce2d2f9dcf0e870d32183e3c52a82e7da15984e5
                          • Opcode Fuzzy Hash: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                          • Instruction Fuzzy Hash: D0213872204AAC40F7E75E1194D03FD66C0EB88FDAF1AC824FAC6076C5CD28C749A708
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: AddfacLocimp::_Locimp_LockitLockit::__lockfreemallocstd::_std::locale::_
                          • String ID:
                          • API String ID: 2732429687-0
                          • Opcode ID: 4c7c4e4cdeb69145b53e9993b344bfcc5c5a1a68407a660adf776166b3026ff4
                          • Instruction ID: 76cda7fa5ebd9028eb80fcaf77cbf10d53a700b3cb3c5ee5f831434e332e8d90
                          • Opcode Fuzzy Hash: 4c7c4e4cdeb69145b53e9993b344bfcc5c5a1a68407a660adf776166b3026ff4
                          • Instruction Fuzzy Hash: 84213B71604A8881EBA2CF11E4403DAB3A0F7597E0F548216EB9D57BA6CF7CC6998740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _getptd
                          • String ID: csm$csm
                          • API String ID: 3186804695-3733052814
                          • Opcode ID: ce9d772766a9f3e407c5664677aefc26ffad84ba179c49f55fff2b9c6189d35d
                          • Instruction ID: f7e595c495de74603a87214bb7ed729c6939f290df5d238fa3d8429b20b6b438
                          • Opcode Fuzzy Hash: ce9d772766a9f3e407c5664677aefc26ffad84ba179c49f55fff2b9c6189d35d
                          • Instruction Fuzzy Hash: 6031A773101B48CADBA18F66C0843993BB5F358B9DF8B5225FA4D1BB64CB75C984C788
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Window$RectText
                          • String ID: hwnd(0x%08x) pos(%d %d) dim(%d %d) %s
                          • API String ID: 3244772712-1731226318
                          • Opcode ID: ab3949e57376ec885a1af7c9daca5177edca3585cc7dbd67c50f2748e189522b
                          • Instruction ID: 92b01b5dcd441b929ae7df912ca680b1e58ecf935882f4103ce8325e60c5377d
                          • Opcode Fuzzy Hash: ab3949e57376ec885a1af7c9daca5177edca3585cc7dbd67c50f2748e189522b
                          • Instruction Fuzzy Hash: B1116A72A2968586EB118B15E45075AE760FB887D0F444121EE8D07B68DB7CE5988F00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3011201976.00007FFDFB481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FFDFB480000, based on PE: true
                          • Associated: 00000000.00000002.3011182983.00007FFDFB480000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011284110.00007FFDFB5F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011313056.00007FFDFB644000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011326899.00007FFDFB646000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011339701.00007FFDFB647000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3011352647.00007FFDFB64E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffdfb480000_loaddll64.jbxd
                          Similarity
                          • API ID: Current$FormatFreeLocalMessageProcessThread
                          • String ID: API function failed with %d: %s
                          • API String ID: 1087594894-470931892
                          • Opcode ID: 0f953ed10209e1cd2ae3cab99d472e1bb3b644d22f0039629b56ab57d6aab400
                          • Instruction ID: ca618582be875cbda7444c90dd54c1121e462fcff1563e49c7fd14459519dd05
                          • Opcode Fuzzy Hash: 0f953ed10209e1cd2ae3cab99d472e1bb3b644d22f0039629b56ab57d6aab400
                          • Instruction Fuzzy Hash: 5F115A32B09B8286D7518F12F89056AB6A1F788BC0F180139EB9D83F6EDF3CC5018B44
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3008848971.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                          • Associated: 00000000.00000002.3008764024.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008903358.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3008959527.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3009001687.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_180000000_loaddll64.jbxd
                          Similarity
                          • API ID: _getptd$_inconsistency
                          • String ID: csm
                          • API String ID: 1773999731-1018135373
                          • Opcode ID: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                          • Instruction ID: 6596bc08887fd2df5714e5c2ca6ea54ff60e088d84c846dd7f248314ba4ebb2f
                          • Opcode Fuzzy Hash: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                          • Instruction Fuzzy Hash: 8D01A736115A4989DBA2AF71D4C17FD2394E7497C9F099171FE4946349DE20C6C9C340