Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
45c62e.msi

Overview

General Information

Sample name:45c62e.msi
Analysis ID:1576719
MD5:eaf9453f96d44bbc8fb4fb72a6508755
SHA1:2c0833c92e9b0f0191056bdbd72ef0b65ab85418
SHA256:11836eb77068d13a1bb7e457f707234340c4a1093c9881aa20b1ab783295d8a0
Tags:bruteratelmsiuser-smica83
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Modifies the context of a thread in another process (thread injection)
Sets debug register (to hijack the execution of another thread)
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • msiexec.exe (PID: 2700 cmdline: "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\45c62e.msi" MD5: E5DA170027542E25EDE42FC54C929077)
  • msiexec.exe (PID: 1164 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 1248 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 46E8AC0904175A2A4C7DC07B8073B258 MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • rundll32.exe (PID: 2508 cmdline: C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmd MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 45c62e.msiReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.0% probability
Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: rundll32.exe, 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmp, avdapi.dll.1.dr
Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: rundll32.exe, 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmp, avdapi.dll.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.dr
Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: c:Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A844E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,4_2_00007FF8A7A844E5
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A90EC0 FindFirstFileW,FindClose,4_2_00007FF8A7A90EC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A90B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,4_2_00007FF8A7A90B20
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8BD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF8A7A8BD20

Networking

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817Jump to behavior
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 94.232.46.11:8817
Source: global trafficTCP traffic: 192.168.2.5:49920 -> 94.232.40.41:8817
Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
Source: Joe Sandbox ViewASN Name: WELLWEBNL WELLWEBNL
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: muuxxu.com
Source: global trafficDNS traffic detected: DNS query: cronoze.com
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0
Source: rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://t2.symcb.com0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://tl.symcd.com0&
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589156153.000001D6C50F3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50FE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
Source: rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589156153.000001D6C50F3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50FE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
Source: rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com/
Source: rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cronoze.com:8817/pentium.php
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com/
Source: rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.php
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.php4
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.phpXAy
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.phpqAb
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/intel.phptAm
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php
Source: rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php2
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.php8
Source: rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.phpY
Source: rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.phph
Source: rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://muuxxu.com:8817/pentium.phpi
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: https://www.advancedinstaller.com
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: https://www.thawte.com/cps0/
Source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drString found in binary or memory: https://www.thawte.com/repository0W
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A86A10 GetSystemMetrics,GetAsyncKeyState,4_2_00007FF8A7A86A10
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D6C89DD270 NtAllocateVirtualMemory,4_3_000001D6C89DD270
Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D6C89DD2E0 NtProtectVirtualMemory,4_3_000001D6C89DD2E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8D460 CreateMutexW,GetLastError,WaitForSingleObject,CreateProcessAsUserW,CloseHandle,CloseHandle,ReleaseMutex,CloseHandle,_invalid_parameter_noinfo_noreturn,RegSetValueExW,RegCloseKey,SendMessageW,RegQueryValueExW,RegCloseKey,4_2_00007FF8A7A8D460
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\5cd2d1.msiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID3EA.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID458.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4C7.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4F7.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}Jump to behavior
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID594.tmpJump to behavior
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSID3EA.tmpJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC7CA44_2_00007FF8A7AC7CA4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A968004_2_00007FF8A7A96800
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC679C4_2_00007FF8A7AC679C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8E7504_2_00007FF8A7A8E750
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A9E67C4_2_00007FF8A7A9E67C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A785104_2_00007FF8A7A78510
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B105004_2_00007FF8A7B10500
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AE04984_2_00007FF8A7AE0498
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A804904_2_00007FF8A7A80490
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A844E54_2_00007FF8A7A844E5
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A964604_2_00007FF8A7A96460
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B4E4304_2_00007FF8A7B4E430
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B443804_2_00007FF8A7B44380
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B2A3B04_2_00007FF8A7B2A3B0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A821B04_2_00007FF8A7A821B0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B581E04_2_00007FF8A7B581E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A6E1104_2_00007FF8A7A6E110
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A84ED04_2_00007FF8A7A84ED0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A82E604_2_00007FF8A7A82E60
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A7EE504_2_00007FF8A7A7EE50
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A74D304_2_00007FF8A7A74D30
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B4ECE04_2_00007FF8A7B4ECE0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AF0C004_2_00007FF8A7AF0C00
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AB2BA04_2_00007FF8A7AB2BA0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7ADEB984_2_00007FF8A7ADEB98
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC6B404_2_00007FF8A7AC6B40
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B54AD04_2_00007FF8A7B54AD0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A70A404_2_00007FF8A7A70A40
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC69944_2_00007FF8A7AC6994
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC69F44_2_00007FF8A7AC69F4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AB38884_2_00007FF8A7AB3888
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B4B8804_2_00007FF8A7B4B880
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A838F04_2_00007FF8A7A838F0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8F7B04_2_00007FF8A7A8F7B0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC97904_2_00007FF8A7AC9790
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC77204_2_00007FF8A7AC7720
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8B5B04_2_00007FF8A7A8B5B0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8F5E04_2_00007FF8A7A8F5E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC75604_2_00007FF8A7AC7560
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8D4604_2_00007FF8A7A8D460
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC72484_2_00007FF8A7AC7248
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B4D1E04_2_00007FF8A7B4D1E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A911504_2_00007FF8A7A91150
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A871504_2_00007FF8A7A87150
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A83F904_2_00007FF8A7A83F90
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A81F504_2_00007FF8A7A81F50
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC5EC04_2_00007FF8A7AC5EC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AE1D984_2_00007FF8A7AE1D98
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8BD204_2_00007FF8A7A8BD20
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7AC1AE44_2_00007FF8A7AC1AE4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A73AC04_2_00007FF8A7A73AC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B659E04_2_00007FF8A7B659E0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A7F9204_2_00007FF8A7A7F920
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004437C4_2_000000018004437C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800377884_2_0000000180037788
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002600C4_2_000000018002600C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002A01C4_2_000000018002A01C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800190204_2_0000000180019020
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800130784_2_0000000180013078
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D08C4_2_000000018003D08C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800330A84_2_00000001800330A8
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B1384_2_000000018001B138
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003713C4_2_000000018003713C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800332784_2_0000000180033278
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001F28C4_2_000000018001F28C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B2944_2_000000018003B294
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800462C44_2_00000001800462C4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000A3144_2_000000018000A314
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800193F04_2_00000001800193F0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800423EC4_2_00000001800423EC
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001A47C4_2_000000018001A47C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003B5084_2_000000018003B508
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800125504_2_0000000180012550
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A5544_2_000000018003A554
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018004363C4_2_000000018004363C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800176E44_2_00000001800176E4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003E7044_2_000000018003E704
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800167444_2_0000000180016744
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800097A84_2_00000001800097A8
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800197C04_2_00000001800197C0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800147EC4_2_00000001800147EC
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800478344_2_0000000180047834
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800268904_2_0000000180026890
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800158A04_2_00000001800158A0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003A9044_2_000000018003A904
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003D91C4_2_000000018003D91C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001B9244_2_000000018001B924
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800329B44_2_00000001800329B4
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800279B84_2_00000001800279B8
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180042A104_2_0000000180042A10
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180045A604_2_0000000180045A60
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018001FA9C4_2_000000018001FA9C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180013BA04_2_0000000180013BA0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180008D6C4_2_0000000180008D6C
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180029D904_2_0000000180029D90
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032E144_2_0000000180032E14
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180048E5A4_2_0000000180048E5A
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180036E704_2_0000000180036E70
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180015EA04_2_0000000180015EA0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002FF504_2_000000018002FF50
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180024F604_2_0000000180024F60
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018000AF744_2_000000018000AF74
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D6C6A59D404_2_000001D6C6A59D40
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D6C6A635244_2_000001D6C6A63524
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D6C6A7AD644_2_000001D6C6A7AD64
Source: C:\Windows\System32\rundll32.exeCode function: String function: 000000018002CC54 appears 39 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 0000000180007B1C appears 38 times
Source: C:\Windows\System32\rundll32.exeCode function: String function: 00007FF8A7A87E10 appears 61 times
Source: 45c62e.msiBinary or memory string: OriginalFilenameAICustAct.dllF vs 45c62e.msi
Source: classification engineClassification label: mal72.evad.winMSI@6/24@4/2
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A87720 GetLastError,FormatMessageW,LocalFree,4_2_00007FF8A7A87720
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B53010 CoInitialize,CoCreateInstance,4_2_00007FF8A7B53010
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CMLD5FD.tmpJump to behavior
Source: C:\Windows\System32\rundll32.exeMutant created: NULL
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\TEMP\~DFED9D7AC097B0F001.TMPJump to behavior
Source: C:\Windows\System32\rundll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmd
Source: 45c62e.msiReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Windows\System32\msiexec.exe "C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\45c62e.msi"
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 46E8AC0904175A2A4C7DC07B8073B258
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmd
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 46E8AC0904175A2A4C7DC07B8073B258Jump to behavior
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmdJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: 45c62e.msiStatic file information: File size 2159104 > 1048576
Source: Binary string: iew\v200\_out\x64-Release\nView64.pdb source: rundll32.exe, 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmp, avdapi.dll.1.dr
Source: Binary string: D:\workspace\workspace\nViewBranchBcDQ%ag&CC(NuA9u@W@o$iew\v200\_out\x64-Release\nView64.pdbU source: rundll32.exe, 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmp, avdapi.dll.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbn source: 45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.dr
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B6ADC0 LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,4_2_00007FF8A7B6ADC0
Source: avdapi.dll.1.drStatic PE information: real checksum: 0x259992 should be: 0x2f8529
Source: avdapi.dll.1.drStatic PE information: section name: _RDATA
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018002CF10 push rsp; iretd 4_2_000000018002CF11
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D6C6A68D98 push ebp; iretd 4_2_000001D6C6A68D9C
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID458.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Users\user\AppData\Roaming\vgruntime\avdapi.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID3EA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4F7.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4C7.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID458.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID3EA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4F7.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSID4C7.tmpJump to dropped file
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8E750 MessageBoxW,lstrlenW,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetForegroundWindow,PostMessageW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendMessageW,4_2_00007FF8A7A8E750
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00000001800329B4 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_00000001800329B4
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\rundll32.exeCode function: GetCurrentProcessId,GetCommandLineW,GetModuleFileNameW,CharLowerW,GetCommandLineW,CommandLineToArgvW,LocalFree,StrStrIW,GetFileVersionInfoSizeW,GetFileVersionInfoW,VerQueryValueW,_invalid_parameter_noinfo_noreturn,StrStrIW,4_2_00007FF8A7A84ED0
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSID458.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSID3EA.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSID4F7.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSID4C7.tmpJump to dropped file
Source: C:\Windows\System32\rundll32.exeAPI coverage: 1.5 %
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A844E5 GetCommandLineW,CommandLineToArgvW,lstrcmpW,lstrcmpW,GetCurrentProcess,IsWow64Process,MessageBoxW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindFirstFileW,FindClose,GetTempFileNameW,CopyFileW,lstrcmpW,lstrcmpW,FindWindowW,SendMessageW,IsWindow,PostMessageW,SHDeleteKeyW,lstrcmpW,lstrlenW,lstrcmpW,lstrcmpW,LocalFree,4_2_00007FF8A7A844E5
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A90EC0 FindFirstFileW,FindClose,4_2_00007FF8A7A90EC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A90B20 FindFirstFileW,lstrcmpW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,4_2_00007FF8A7A90B20
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A8BD20 RegOpenKeyExW,RegQueryValueExW,RegCloseKey,MessageBoxW,ShellExecuteW,GetSystemDirectoryW,wsprintfW,FindFirstFileW,MessageBoxW,ShellExecuteW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF8A7A8BD20
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A70760 RegQueryValueExW,RegCloseKey,GetSystemInfo,MapViewOfFileEx,CloseHandle,CloseHandle,4_2_00007FF8A7A70760
Source: rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: rundll32.exe, 00000004.00000003.2589169443.000001D6C509E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_4-88114
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B0BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8A7B0BAA0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003EEEC EncodePointer,__crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,4_2_000000018003EEEC
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B6ADC0 LoadLibraryW,GetProcAddress,FreeLibrary,GetDC,GetDeviceCaps,ReleaseDC,4_2_00007FF8A7B6ADC0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180047394 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,_write_nolock,__doserrno,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,_get_osfhandle,SetEndOfFile,_errno,__doserrno,GetLastError,_lseeki64_nolock,4_2_0000000180047394
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\System32\rundll32.exe C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmdJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7B0BAA0 RtlCaptureContext,VirtualAlloc,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF8A7B0BAA0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180032DD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0000000180032DD8

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.46.11 8817Jump to behavior
Source: C:\Windows\System32\rundll32.exeNetwork Connect: 94.232.40.41 8817Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 1248Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: target process: 1248Jump to behavior
Source: C:\Windows\System32\rundll32.exeThread register set: 1248 1Jump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A704D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,4_2_00007FF8A7A704D0
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A704D0 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LocalFree,CreateFileMappingW,GetLastError,FreeSid,LocalFree,LocalFree,4_2_00007FF8A7A704D0
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,4_2_00007FF8A7AC5624
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoEx,__crtDownlevelLocaleNameToLCID,GetLocaleInfoW,4_2_00000001800354AC
Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,free,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_mon,free,free,free,free,4_2_00000001800400E0
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180043100
Source: C:\Windows\System32\rundll32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_000000018004324C
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,GetLocaleInfoW,4_2_00000001800432FC
Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,_malloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,_calloc_crt,GetCPInfo,__crtLCMapStringA,__crtLCMapStringA,__crtGetStringTypeA,free,free,free,free,free,free,free,free,free,4_2_000000018002E394
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,4_2_00000001800433A4
Source: C:\Windows\System32\rundll32.exeCode function: EnumSystemLocalesW,4_2_00000001800353EC
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800423EC
Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,4_2_00000001800384A0
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,4_2_000000018003B508
Source: C:\Windows\System32\rundll32.exeCode function: _calloc_crt,_malloc_crt,free,_malloc_crt,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__free_lconv_num,free,free,free,4_2_000000018004064C
Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,4_2_0000000180042858
Source: C:\Windows\System32\rundll32.exeCode function: ___lc_locale_name_func,__crtGetLocaleInfoEx,4_2_00000001800298D8
Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,4_2_000000018004290C
Source: C:\Windows\System32\rundll32.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,4_2_00000001800419E8
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,4_2_0000000180042A10
Source: C:\Windows\System32\rundll32.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,4_2_0000000180041B54
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042D88
Source: C:\Windows\System32\rundll32.exeCode function: __getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,__getlocaleinfo,4_2_0000000180040DB0
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,EnumSystemLocalesW,4_2_0000000180042E3C
Source: C:\Windows\System32\rundll32.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,4_2_0000000180042ED0
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_0000000180039844 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_0000000180039844
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000000018003E704 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,4_2_000000018003E704
Source: C:\Windows\System32\rundll32.exeCode function: 4_2_00007FF8A7A867D0 GetModuleHandleA,GetProcAddress,GetVersionExW,4_2_00007FF8A7A867D0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Valid Accounts
1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
11
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomains1
Replication Through Removable Media
Scheduled Task/Job1
Valid Accounts
1
Valid Accounts
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
Remote Desktop Protocol11
Input Capture
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook31
Process Injection
1
DLL Side-Loading
NTDS25
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets131
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
Masquerading
Cached Domain Credentials1
Process Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Valid Accounts
DCSync1
Application Window Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Access Token Manipulation
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
Process Injection
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Rundll32
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
45c62e.msi16%ReversingLabsWin32.Trojan.Seheq
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\vgruntime\avdapi.dll5%ReversingLabsWin64.Trojan.Seheq
C:\Windows\Installer\MSID3EA.tmp0%ReversingLabs
C:\Windows\Installer\MSID458.tmp0%ReversingLabs
C:\Windows\Installer\MSID4C7.tmp0%ReversingLabs
C:\Windows\Installer\MSID4F7.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://muuxxu.com:8817/intel.phpqAb0%Avira URL Cloudsafe
https://cronoze.com/0%Avira URL Cloudsafe
https://muuxxu.com:8817/0%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.php0%Avira URL Cloudsafe
https://muuxxu.com/0%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.php80%Avira URL Cloudsafe
https://muuxxu.com:8817/intel.php0%Avira URL Cloudsafe
http://r11.o.lencr.org0#0%Avira URL Cloudsafe
https://muuxxu.com:8817/intel.phpXAy0%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.phpY0%Avira URL Cloudsafe
https://www.advancedinstaller.com0%Avira URL Cloudsafe
https://muuxxu.com:8817/intel.phptAm0%Avira URL Cloudsafe
https://muuxxu.com:8817/intel.php40%Avira URL Cloudsafe
https://cronoze.com:8817/pentium.php0%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.php20%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.phph0%Avira URL Cloudsafe
https://muuxxu.com:8817/pentium.phpi0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cronoze.com
94.232.40.41
truetrue
    unknown
    muuxxu.com
    94.232.46.11
    truetrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://muuxxu.com:8817/intel.phpqAbrundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://muuxxu.com/rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://muuxxu.com:8817/intel.phpXAyrundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://r11.o.lencr.org0#rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.thawte.com/cps0/45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drfalse
        high
        https://cronoze.com/rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://muuxxu.com:8817/intel.phprundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://muuxxu.com:8817/pentium.phprundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://x1.c.lencr.org/0rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589156153.000001D6C50F3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50FE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://x1.i.lencr.org/0rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589156153.000001D6C50F3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50FE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://www.thawte.com/repository0W45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drfalse
              high
              https://muuxxu.com:8817/pentium.php8rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://muuxxu.com:8817/pentium.phpYrundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://muuxxu.com:8817/rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://www.advancedinstaller.com45c62e.msi, 5cd2d1.msi.1.dr, MSID458.tmp.1.dr, MSID3EA.tmp.1.dr, MSID4F7.tmp.1.dr, MSID4C7.tmp.1.drfalse
              • Avira URL Cloud: safe
              unknown
              https://cronoze.com:8817/pentium.phprundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://muuxxu.com:8817/intel.phptAmrundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://muuxxu.com:8817/intel.php4rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://muuxxu.com:8817/pentium.php2rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://r11.i.lencr.org/0rundll32.exe, 00000004.00000003.3205730297.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50EC000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589169443.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50B7000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50B0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047431332.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.4047401761.000001D6C50FD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5028000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C5081000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.2589118897.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.4530700291.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.3205730297.000001D6C50F0000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://muuxxu.com:8817/pentium.phphrundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://muuxxu.com:8817/pentium.phpirundll32.exe, 00000004.00000003.4047431332.000001D6C50C0000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                94.232.46.11
                muuxxu.comRussian Federation
                44477WELLWEBNLtrue
                94.232.40.41
                cronoze.comRussian Federation
                44477WELLWEBNLtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1576719
                Start date and time:2024-12-17 13:09:11 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 8m 18s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:45c62e.msi
                Detection:MAL
                Classification:mal72.evad.winMSI@6/24@4/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 8
                • Number of non-executed functions: 123
                Cookbook Comments:
                • Found application associated with file extension: .msi
                • Override analysis time to 240s for rundll32
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.109.210.53
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: 45c62e.msi
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                94.232.46.11TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                  TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                    94.232.40.41TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                      TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        muuxxu.comTiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.46.11
                        TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.46.11
                        cronoze.comTiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        WELLWEBNLTiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        avutil.dll.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.43.224
                        fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                        • 94.232.43.224
                        wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                        • 94.232.43.224
                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        merd.msiGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        mesh.exeGet hashmaliciousMeshAgentBrowse
                        • 94.232.43.185
                        mesh.exeGet hashmaliciousMeshAgentBrowse
                        • 94.232.43.185
                        WELLWEBNLTiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        TiNgny4xSB.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.40.41
                        avutil.dll.dllGet hashmaliciousBruteRatelBrowse
                        • 94.232.43.224
                        fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                        • 94.232.43.224
                        wait.dll.dllGet hashmaliciousBruteRatel, LatrodectusBrowse
                        • 94.232.43.224
                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        merd.msiGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        sqx.dll.dllGet hashmaliciousUnknownBrowse
                        • 94.232.40.38
                        mesh.exeGet hashmaliciousMeshAgentBrowse
                        • 94.232.43.185
                        mesh.exeGet hashmaliciousMeshAgentBrowse
                        • 94.232.43.185
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Windows\Installer\MSID3EA.tmpDoc_21-04-53.jsGet hashmaliciousMatanbuchusBrowse
                          klog.php.msiGet hashmaliciousMatanbuchusBrowse
                            Doc_21-04-53.jsGet hashmaliciousMatanbuchusBrowse
                              fes.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                zdi.txt.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                  merd.msiGet hashmaliciousUnknownBrowse
                                    medk.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                      lavi.msiGet hashmaliciousBruteRatel, LatrodectusBrowse
                                        Document-v09-42-38.jsGet hashmaliciousBruteRatelBrowse
                                          Document-v05-53-20.jsGet hashmaliciousBruteRatel, LatrodectusBrowse
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):1368
                                            Entropy (8bit):5.697785653263688
                                            Encrypted:false
                                            SSDEEP:24:MlOgj0fG6k//bL//L/MRpUzFPt1DhiSt8li+EQs6F:MgO0Jk//bL//L/MbmPt1D8SmjE36F
                                            MD5:98DB00037B48617B8AFCFB498C26AA3E
                                            SHA1:9B6043837C46295C86E599DE4F543478DE3DCF8C
                                            SHA-256:1CDA9765FE33523B55B114FDB382D0B5F6D0E10505139F624D772F2D0280A632
                                            SHA-512:BE7B79F3C800D6E84D7C3F2ED4FB4E24862B67BC325EA3B98CD678475A00A299EDA461F45A0A1CFA34E6A43BA30D7767B494CC46F8CDC9ACE3F224B6BFE31F2B
                                            Malicious:false
                                            Reputation:low
                                            Preview:...@IXOS.@.....@D9.Y.@.....@.....@.....@.....@.....@......&.{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}..IInlimited..45c62e.msi.@.....@.....@.....@........&.{C6D77FA2-AA69-491D-B464-EE0A4DAA19FE}.....@.....@.....@.....@.......@.....@.....@.......@......IInlimited......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}&.{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}.@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}&.{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}.@......&.{E1A0AE30-67F1-4CEA-BFAD-F8B5724D00D8}&.{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}.@........CreateFolders..Creating folders..Folder: [1]#.:.C:\Users\user\AppData\Roaming\IInlimited INC\IInlimited\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]..*.C:\Users\user\AppData\Roaming\vgruntime\....4.C:\Users\user\AppData\Roaming\vgruntime\avdapi.dll....WriteRegistryValues..Writing system
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                            Category:dropped
                                            Size (bytes):3112960
                                            Entropy (8bit):7.017969386306067
                                            Encrypted:false
                                            SSDEEP:49152:1x4R6f1w6HKPwqliTUERW+e46IwdKMmMxSp:1+R+wlPwHgEofIwRmyS
                                            MD5:E5EC8B7CF88C66F78D607F76A2095FDA
                                            SHA1:FDA7752C604FF7673AE31DC45A8F0A9DD0A3A6AC
                                            SHA-256:1552C43ECF6EEB5E2FE13CC1C25E6BDACF227222AFAA9A523D996B6331945505
                                            SHA-512:80DDBEF4E3E8912B15B2A41A9416041159C305DD24D5E06C62008708E8CF4C307981CE0C96690B9B1FB7DC72634C3F172993AB73B82AC53CCE9995B64ADDB1D3
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 5%
                                            Reputation:low
                                            Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$..........xUis+Uis+Uis+..p*_is+..v*.is+3..+Tis+..w*Dis+..p*_is+..v*.is+..z*]is+..w*@is+\..+Wis+\..+Tis+..r*Bis+Uir+.hs+..v*~is+..s*Tis+...+Tis+Ui.+Tis+..q*Tis+RichUis+........PE..d......f.........." ................$b....................................... 0.......%...`.................................................x...........0.......X....,%..L....0.....p...T.......................(......8............................................text............................... ..`.rdata...3.......4..................@..@.data.......@...8..."..............@....pdata..X............Z..............@..@_RDATA...............V..............@..@.rsrc...0............X..............@..@.reloc........0......p/.............@..B............................................................................................................................yIjO8$aSPtIb+rv5J*&Fq1MJ%UqT9XrJ@sG.
                                            Process:C:\Windows\System32\rundll32.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):112
                                            Entropy (8bit):5.238052471787967
                                            Encrypted:false
                                            SSDEEP:3:BJU3WCwlzdGmTEnMg8nBLoVcPBHQ9QaiuEKMcypPV:BJuWCwpYBM5BBBHkQaiuEXcQt
                                            MD5:267F243C17224B78BCAE6B6973DEB0FB
                                            SHA1:BB657EFFA4763D4869A2672343E3EE3155B704DD
                                            SHA-256:58701BB95F26FEC16E8C680322057FD6C8509E2615EB06E54C6D4003A3806324
                                            SHA-512:A62C870F0AED5223A7C22BDDBA4C3F9BAA3D3B8160354D07E7E0D05BB735F3727D89C7EB16E9B83C732649BD798ED8269D07E81FC3AE1DE95188BA1650EB01D5
                                            Malicious:false
                                            Reputation:low
                                            Preview:{YXZkYXBpLmRsbA==, IkM6XFVzZXJzXGFsZm9uc1xBcHBEYXRhXFJvYW1pbmdcdmdydW50aW1lXGF2ZGFwaS5kbGwi, MQ==, blZpZXdDbWQ=}
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C6D77FA2-AA69-491D-B464-EE0A4DAA19FE}, Number of Words: 10, Subject: IInlimited, Author: IInlimited INC, Name of Creating Application: IInlimited, Template: ;1033, Comments: Create database IInlimited, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                            Category:dropped
                                            Size (bytes):2159104
                                            Entropy (8bit):7.684407174686371
                                            Encrypted:false
                                            SSDEEP:49152:w82TYBZKumZr7AkYwlxnlLcGWXfyZ+longOKNziyjvNKMBMxIh:MYnK/AkVBZc5XKZ4o9KNbvhByI
                                            MD5:EAF9453F96D44BBC8FB4FB72A6508755
                                            SHA1:2C0833C92E9B0F0191056BDBD72EF0B65AB85418
                                            SHA-256:11836EB77068D13A1BB7E457F707234340C4A1093C9881AA20B1AB783295D8A0
                                            SHA-512:9DE4E541FAA98F05658C364F6C67F4104E41C5ACC4821112FA3974CFCE783D3F147B6CA7A2599B04DCAEDB5CCC4A4F9C6C5C2A9D6D0AE9E63D2F6A573A5AED68
                                            Malicious:false
                                            Reputation:low
                                            Preview:......................>...................!...................................D.......`......................................./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...............................................................................................................................................................................................................................................................................................................................;...........!...3............................................................................................... ...+..."...#...$...%...&...'...(...)...*...1...,...-......./...0...4...2...:...?...5...6...7...8...9...>...<.......=...........@...A...B...C...........F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):446944
                                            Entropy (8bit):6.403916470886214
                                            Encrypted:false
                                            SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                            MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                            SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                            SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                            SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Joe Sandbox View:
                                            • Filename: Doc_21-04-53.js, Detection: malicious, Browse
                                            • Filename: klog.php.msi, Detection: malicious, Browse
                                            • Filename: Doc_21-04-53.js, Detection: malicious, Browse
                                            • Filename: fes.msi, Detection: malicious, Browse
                                            • Filename: zdi.txt.msi, Detection: malicious, Browse
                                            • Filename: merd.msi, Detection: malicious, Browse
                                            • Filename: medk.msi, Detection: malicious, Browse
                                            • Filename: lavi.msi, Detection: malicious, Browse
                                            • Filename: Document-v09-42-38.js, Detection: malicious, Browse
                                            • Filename: Document-v05-53-20.js, Detection: malicious, Browse
                                            Reputation:moderate, very likely benign file
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):446944
                                            Entropy (8bit):6.403916470886214
                                            Encrypted:false
                                            SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                            MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                            SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                            SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                            SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):446944
                                            Entropy (8bit):6.403916470886214
                                            Encrypted:false
                                            SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                            MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                            SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                            SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                            SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):446944
                                            Entropy (8bit):6.403916470886214
                                            Encrypted:false
                                            SSDEEP:6144:5x0A4eCDsgvSd7ftYx5fnLHT7ybjfgaUFfQiAOuv2IaZeB+:5x0ECIgYOx5fnL/tYi8OBZr
                                            MD5:475D20C0EA477A35660E3F67ECF0A1DF
                                            SHA1:67340739F51E1134AE8F0FFC5AE9DD710E8E3A08
                                            SHA-256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
                                            SHA-512:99525AAAB2AB608134B5D66B5313E7FC3C2E2877395C5C171897D7A6C66EFB26B606DE1A4CB01118C2738EA4B6542E4EB4983E631231B3F340BF85E509A9589E
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........0...c...c...c...b...c...bZ..c...b...c...b...c...b...c...b...c...b...c...b...c...c...cF..b...cF..b...cF..c...c..{c...cF..b...cRich...c........................PE..L....;.a.........."!.....t...P......'.....................................................@.........................PK......$S..........0........................L......p...............................@...............4............................text....r.......t.................. ..`.rdata..@............x..............@..@.data....!...p.......R..............@....rsrc...0............d..............@..@.reloc...L.......N...j..............@..B........................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1744
                                            Entropy (8bit):5.5383134265291
                                            Encrypted:false
                                            SSDEEP:24:MlTgj0f0u6SkoLu0ttcypUUFP3Xw9QPl7lcc1SDhiSftlMxin:MxO0Q6Lth/P3XwOF8D8S1l0i
                                            MD5:A00FA60F28BC7A24A58727729BCDE2EA
                                            SHA1:B53CB3262FC28452E2398220DB910500D934350F
                                            SHA-256:E21EB7C12575AF6B9CA3A1F4ED2C6238C1AB734C06DA06CCBD82CE38994DD265
                                            SHA-512:CEFE89DCA2654A15D7D531E6F37DAF9E00ED8EC33EE04A13E88B74C8DA73AB176C4A6CC3FDC3DDECA464B1D9A9C18A85D8DD873873552A9DE097DA67367CA266
                                            Malicious:false
                                            Preview:...@IXOS.@.....@D9.Y.@.....@.....@.....@.....@.....@......&.{4C0A4C04-B78F-4D97-A68D-084ABF0CFF9C}..IInlimited..45c62e.msi.@.....@.....@.....@........&.{C6D77FA2-AA69-491D-B464-EE0A4DAA19FE}.....@.....@.....@.....@.......@.....@.....@.......@......IInlimited......Rollback..Rolling back action:....RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration...@.....@.....@.]....&.{B48CC27C-9823-4256-8235-834BFD2D0DBB}:.C:\Users\user\AppData\Roaming\IInlimited INC\IInlimited\.@.......@.....@.....@......&.{4A323D5F-6D73-4C26-8E39-BE8928DA13EB}..01:\Software\IInlimited INC\IInlimited\Version.@.......@.....@.....@......&.{E1A0AE30-67F1-4CEA-BFAD-F8B5724D00D8}4.C:\Users\user\AppData\Roaming\vgruntime\avdapi.dll.@.......@.....@.....@........CreateFolders..Creating folders..Folder: [1]".:.C:\Users\user\AppData\Roaming\IInlimited INC\IInlimited\.@........InstallFiles..Copying new files&.File: [1], Directory: [9], Size: [6]...@..
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.1624245437908256
                                            Encrypted:false
                                            SSDEEP:12:JSbX72FjyaAGiLIlHVRpth/7777777777777777777777777vDHFMpSl0i8Q:JbQI5poF
                                            MD5:15481EE4563E0399C635603EF5BEF77E
                                            SHA1:12823156E7A351F869D56FFC8D102294400B3A55
                                            SHA-256:DD0AC63931484DF512BE0A53D065FB71A8EF7ABCCB9965A98B50E21F47837718
                                            SHA-512:4523166BBDA7053A4E20301CFE6BACD889EBFB47FC20B8AAC96CBEFBBFC2D15FA3E0E536E548FCEE69CA9E7C5689B7F02180F12E39F31DCE684FD9E130935FA1
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.5404433939301025
                                            Encrypted:false
                                            SSDEEP:48:O8PhquRc06WXJenT5ZPuwFkzSxtAErCy7vzSxBTV:Bhq11nTX2wFwNwCYw
                                            MD5:92FBABEC461B6E732C7092E285BE9AA0
                                            SHA1:64DC9997F2A45BA88F61622F55F17B2D53C5564F
                                            SHA-256:57F72FA91518C8624E78BE2708BD1C143DEF42C9D81ABD8C73328EF07B7926C0
                                            SHA-512:518AD56DE51642B04E01C2F3380F0BFE04542954CD7E49706179EC2F5B325B55BF3355CA5AFC98645628E1C7FDD53D5075FA1935A9F07CEE5CE8C4D629CE5DB6
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):364484
                                            Entropy (8bit):5.365490807036593
                                            Encrypted:false
                                            SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26Kgaux:zTtbmkExhMJCIpE2
                                            MD5:CB9928A8CCAD0EF76866B9778D5A2908
                                            SHA1:EAC10D5FE5E9B2A6C144536372065714E2DEF87D
                                            SHA-256:39A8D7B6E19B92ED85DA2960D4625821B261E1C5F20148A06F2ED3722848CF54
                                            SHA-512:611B46AA1A143BE2BBECEF93B2913D1A430B142EC81F93437EF2C6AE092DFA917D083F2855FA03D805AAEA3345A7D4B547AF94032584CC5BDC1FA0422A6FEB5F
                                            Malicious:false
                                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.2369319061396764
                                            Encrypted:false
                                            SSDEEP:48:rziuvM+CFXJ9T5xPuwFkzSxtAErCy7vzSxBTV:XiJVT/2wFwNwCYw
                                            MD5:9A306B22209DF2B82C0BC12E54B618AC
                                            SHA1:43885CA7848263050AC51F049E3B586B21A0CB38
                                            SHA-256:D01ED6A21F4E3000C1D27EAFB05F996CADD3976FBD0327FAAC6E096AA7E79BB1
                                            SHA-512:C2F72AE83627A3F14B744D0762AA965AF93150584DB6130D78D61B8931D7F6BB3C1E6F1705CB13710BFDCAE3F9A9947079AD20184FEADFDB619768300441A369
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.2369319061396764
                                            Encrypted:false
                                            SSDEEP:48:rziuvM+CFXJ9T5xPuwFkzSxtAErCy7vzSxBTV:XiJVT/2wFwNwCYw
                                            MD5:9A306B22209DF2B82C0BC12E54B618AC
                                            SHA1:43885CA7848263050AC51F049E3B586B21A0CB38
                                            SHA-256:D01ED6A21F4E3000C1D27EAFB05F996CADD3976FBD0327FAAC6E096AA7E79BB1
                                            SHA-512:C2F72AE83627A3F14B744D0762AA965AF93150584DB6130D78D61B8931D7F6BB3C1E6F1705CB13710BFDCAE3F9A9947079AD20184FEADFDB619768300441A369
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):0.07001777091928756
                                            Encrypted:false
                                            SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKOB/QVky6lS:2F0i8n0itFzDHFtS
                                            MD5:7F4CFFC7877F8E86CBBFC3CBEF311CE6
                                            SHA1:094DC38E956DBCBB9DACCDA135C380F12F119463
                                            SHA-256:DFAC563F0019927B6DC294C562D9BC339DFB5CDC4ACB8834D6C5DDC4DA274B13
                                            SHA-512:D9000F1CAE37C59EAA738A61E87102D7487403EBD49B9E6C2CC0D11CB2885F6C04FD1ADC7B8A6FA006AFB600FA589A3EDD8E9FCEFC1615A1B3E00920A8E050D3
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.5404433939301025
                                            Encrypted:false
                                            SSDEEP:48:O8PhquRc06WXJenT5ZPuwFkzSxtAErCy7vzSxBTV:Bhq11nTX2wFwNwCYw
                                            MD5:92FBABEC461B6E732C7092E285BE9AA0
                                            SHA1:64DC9997F2A45BA88F61622F55F17B2D53C5564F
                                            SHA-256:57F72FA91518C8624E78BE2708BD1C143DEF42C9D81ABD8C73328EF07B7926C0
                                            SHA-512:518AD56DE51642B04E01C2F3380F0BFE04542954CD7E49706179EC2F5B325B55BF3355CA5AFC98645628E1C7FDD53D5075FA1935A9F07CEE5CE8C4D629CE5DB6
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):73728
                                            Entropy (8bit):0.129097547276746
                                            Encrypted:false
                                            SSDEEP:24:/DoqqETx0Y0IipV0Y0S0Y0IipV0Y0KAEV0yjCy7VQwGHs2+XluO:siT1zSxZzSxtAErCy7t2wuO
                                            MD5:FDA13B4771421CBFF91AB019C4CFDCBB
                                            SHA1:F0E39EE5D248266B41200A9D16EBC052FFF13214
                                            SHA-256:2F76E416B43477657F586A1F01B318F055F3794B347F6177A2588799B71333AC
                                            SHA-512:02BB4DDA540A15CA83BA0B1E6ABA36F87467853EFA4B5F6EA210B94790FCD160926BE6AEB029B48D74FB0AB35283668E400A6D9E7DDB46FCCA8F576538F0E65A
                                            Malicious:false
                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):512
                                            Entropy (8bit):0.0
                                            Encrypted:false
                                            SSDEEP:3::
                                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                            Malicious:false
                                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):32768
                                            Entropy (8bit):1.2369319061396764
                                            Encrypted:false
                                            SSDEEP:48:rziuvM+CFXJ9T5xPuwFkzSxtAErCy7vzSxBTV:XiJVT/2wFwNwCYw
                                            MD5:9A306B22209DF2B82C0BC12E54B618AC
                                            SHA1:43885CA7848263050AC51F049E3B586B21A0CB38
                                            SHA-256:D01ED6A21F4E3000C1D27EAFB05F996CADD3976FBD0327FAAC6E096AA7E79BB1
                                            SHA-512:C2F72AE83627A3F14B744D0762AA965AF93150584DB6130D78D61B8931D7F6BB3C1E6F1705CB13710BFDCAE3F9A9947079AD20184FEADFDB619768300441A369
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\System32\msiexec.exe
                                            File Type:Composite Document File V2 Document, Cannot read section info
                                            Category:dropped
                                            Size (bytes):20480
                                            Entropy (8bit):1.5404433939301025
                                            Encrypted:false
                                            SSDEEP:48:O8PhquRc06WXJenT5ZPuwFkzSxtAErCy7vzSxBTV:Bhq11nTX2wFwNwCYw
                                            MD5:92FBABEC461B6E732C7092E285BE9AA0
                                            SHA1:64DC9997F2A45BA88F61622F55F17B2D53C5564F
                                            SHA-256:57F72FA91518C8624E78BE2708BD1C143DEF42C9D81ABD8C73328EF07B7926C0
                                            SHA-512:518AD56DE51642B04E01C2F3380F0BFE04542954CD7E49706179EC2F5B325B55BF3355CA5AFC98645628E1C7FDD53D5075FA1935A9F07CEE5CE8C4D629CE5DB6
                                            Malicious:false
                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {C6D77FA2-AA69-491D-B464-EE0A4DAA19FE}, Number of Words: 10, Subject: IInlimited, Author: IInlimited INC, Name of Creating Application: IInlimited, Template: ;1033, Comments: Create database IInlimited, Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                            Entropy (8bit):7.684407174686371
                                            TrID:
                                            • Windows SDK Setup Transform Script (63028/2) 47.91%
                                            • Microsoft Windows Installer (60509/1) 46.00%
                                            • Generic OLE2 / Multistream Compound File (8008/1) 6.09%
                                            File name:45c62e.msi
                                            File size:2'159'104 bytes
                                            MD5:eaf9453f96d44bbc8fb4fb72a6508755
                                            SHA1:2c0833c92e9b0f0191056bdbd72ef0b65ab85418
                                            SHA256:11836eb77068d13a1bb7e457f707234340c4a1093c9881aa20b1ab783295d8a0
                                            SHA512:9de4e541faa98f05658c364f6c67f4104e41c5acc4821112fa3974cfce783d3f147b6ca7a2599b04dcaedb5ccc4a4f9c6c5c2a9d6d0ae9e63d2f6a573a5aed68
                                            SSDEEP:49152:w82TYBZKumZr7AkYwlxnlLcGWXfyZ+longOKNziyjvNKMBMxIh:MYnK/AkVBZc5XKZ4o9KNbvhByI
                                            TLSH:36A501223386CA3BC96E42703519979F2068FDA7077180D7A3C9291EEDB44D06B7DF96
                                            File Content Preview:........................>...................!...................................D.......`......................................./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B..................................................
                                            Icon Hash:2d2e3797b32b2b99
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 17, 2024 13:10:14.632539988 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:14.752476931 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:14.752592087 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:14.762377024 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:14.882220984 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:17.646866083 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:17.646893978 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:17.646905899 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:17.646974087 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:17.647021055 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:17.691750050 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:17.811616898 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:18.118307114 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:18.118465900 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:18.130120039 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:18.250093937 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:25.001492023 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:25.001578093 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:25.003091097 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:25.122801065 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:25.123186111 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:25.123828888 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:25.243521929 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.520348072 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.520411968 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.520423889 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.520493984 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:27.523675919 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:27.643383026 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.950129032 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:10:27.950424910 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:27.951208115 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:10:28.071118116 CET88174970894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:11:00.015819073 CET497088817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:11:55.006484032 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:11:55.007332087 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:11:55.836250067 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:11:55.956032991 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:11:55.956171989 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:11:55.956666946 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:11:56.076415062 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:11:58.342233896 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:11:58.342257977 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:11:58.342268944 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:11:58.342482090 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:11:58.351641893 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:11:58.471492052 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:12:01.690097094 CET497048817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:01.809906960 CET88174970494.232.46.11192.168.2.5
                                            Dec 17, 2024 13:12:05.833933115 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:12:05.833998919 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:12:05.834635019 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:12:05.954400063 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:12:21.333091974 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:12:21.333215952 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:12:52.352633953 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:52.472512007 CET88174997794.232.46.11192.168.2.5
                                            Dec 17, 2024 13:12:52.472640991 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:52.473113060 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:52.592835903 CET88174997794.232.46.11192.168.2.5
                                            Dec 17, 2024 13:12:53.781819105 CET88174997794.232.46.11192.168.2.5
                                            Dec 17, 2024 13:12:53.781953096 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:53.784192085 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:53.785289049 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:12:53.904077053 CET88174997794.232.46.11192.168.2.5
                                            Dec 17, 2024 13:12:53.905298948 CET88174997794.232.46.11192.168.2.5
                                            Dec 17, 2024 13:13:25.843910933 CET499778817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:13:51.350404978 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:13:51.350553036 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:13:51.641230106 CET499208817192.168.2.594.232.40.41
                                            Dec 17, 2024 13:13:51.761317968 CET88174992094.232.40.41192.168.2.5
                                            Dec 17, 2024 13:14:09.901134014 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:10.021756887 CET88174997894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:14:10.021848917 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:10.022260904 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:10.142915010 CET88174997894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:14:13.009218931 CET88174997894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:14:13.009454012 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:13.010308981 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:13.011509895 CET499788817192.168.2.594.232.46.11
                                            Dec 17, 2024 13:14:13.130038023 CET88174997894.232.46.11192.168.2.5
                                            Dec 17, 2024 13:14:13.131146908 CET88174997894.232.46.11192.168.2.5
                                            TimestampSource PortDest PortSource IPDest IP
                                            Dec 17, 2024 13:10:11.676570892 CET5709553192.168.2.51.1.1.1
                                            Dec 17, 2024 13:10:12.687915087 CET5709553192.168.2.51.1.1.1
                                            Dec 17, 2024 13:10:13.703990936 CET5709553192.168.2.51.1.1.1
                                            Dec 17, 2024 13:10:14.626669884 CET53570951.1.1.1192.168.2.5
                                            Dec 17, 2024 13:10:14.626687050 CET53570951.1.1.1192.168.2.5
                                            Dec 17, 2024 13:10:14.626696110 CET53570951.1.1.1192.168.2.5
                                            Dec 17, 2024 13:11:55.074875116 CET6331353192.168.2.51.1.1.1
                                            Dec 17, 2024 13:11:55.834964991 CET53633131.1.1.1192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Dec 17, 2024 13:10:11.676570892 CET192.168.2.51.1.1.10x9544Standard query (0)muuxxu.comA (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:10:12.687915087 CET192.168.2.51.1.1.10x9544Standard query (0)muuxxu.comA (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:10:13.703990936 CET192.168.2.51.1.1.10x9544Standard query (0)muuxxu.comA (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:11:55.074875116 CET192.168.2.51.1.1.10x9984Standard query (0)cronoze.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Dec 17, 2024 13:10:14.626669884 CET1.1.1.1192.168.2.50x9544No error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:10:14.626687050 CET1.1.1.1192.168.2.50x9544No error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:10:14.626696110 CET1.1.1.1192.168.2.50x9544No error (0)muuxxu.com94.232.46.11A (IP address)IN (0x0001)false
                                            Dec 17, 2024 13:11:55.834964991 CET1.1.1.1192.168.2.50x9984No error (0)cronoze.com94.232.40.41A (IP address)IN (0x0001)false

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:07:10:05
                                            Start date:17/12/2024
                                            Path:C:\Windows\System32\msiexec.exe
                                            Wow64 process (32bit):false
                                            Commandline:"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\45c62e.msi"
                                            Imagebase:0x7ff688d10000
                                            File size:69'632 bytes
                                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:1
                                            Start time:07:10:05
                                            Start date:17/12/2024
                                            Path:C:\Windows\System32\msiexec.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\msiexec.exe /V
                                            Imagebase:0x7ff688d10000
                                            File size:69'632 bytes
                                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Target ID:3
                                            Start time:07:10:05
                                            Start date:17/12/2024
                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 46E8AC0904175A2A4C7DC07B8073B258
                                            Imagebase:0x690000
                                            File size:59'904 bytes
                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:4
                                            Start time:07:10:06
                                            Start date:17/12/2024
                                            Path:C:\Windows\System32\rundll32.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:/Windows/System32/rundll32.exe avdapi.dll, nViewCmd
                                            Imagebase:0x7ff72dad0000
                                            File size:71'680 bytes
                                            MD5 hash:EF3179D498793BF4234F708D3BE28633
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:3.4%
                                              Dynamic/Decrypted Code Coverage:99.1%
                                              Signature Coverage:19.7%
                                              Total number of Nodes:229
                                              Total number of Limit Nodes:5
                                              execution_graph 88009 180037788 88010 1800377aa __crtLCMapStringA_stat 88009->88010 88011 180037806 88010->88011 88012 1800377e6 88010->88012 88037 1800377da 88010->88037 88013 180037854 88011->88013 88016 180037849 88011->88016 88067 18002f26c 63 API calls _getptd_noexit 88012->88067 88017 180037869 88013->88017 88071 180037538 65 API calls 3 library calls 88013->88071 88070 18002f26c 63 API calls _getptd_noexit 88016->88070 88059 18003ec20 88017->88059 88018 1800377eb 88068 18002f2dc 63 API calls _getptd_noexit 88018->88068 88025 1800377f3 88069 180035cb8 12 API calls _invalid_parameter_noinfo 88025->88069 88027 180037ebe WriteFile 88029 180037ee8 GetLastError 88027->88029 88030 180037edd 88027->88030 88043 180037b34 88029->88043 88030->88029 88031 180037899 GetConsoleMode 88032 1800378d9 88031->88032 88031->88043 88034 1800378e8 GetConsoleCP 88032->88034 88032->88043 88033 180037f0d 88033->88037 88077 18002f2dc 63 API calls _getptd_noexit 88033->88077 88034->88033 88057 18003790c _fgetwc_nolock 88034->88057 88036 180037f39 88078 18002f26c 63 API calls _getptd_noexit 88036->88078 88079 18002cc10 88037->88079 88038 180037c37 WriteFile 88040 180037b5f GetLastError 88038->88040 88038->88043 88040->88043 88041 180037dfa WideCharToMultiByte 88046 180037e46 WriteFile 88041->88046 88047 180037b69 GetLastError 88041->88047 88042 180037d24 WriteFile 88042->88040 88051 180037cd6 88042->88051 88043->88027 88043->88033 88043->88037 88043->88038 88043->88041 88043->88042 88045 180037f06 88043->88045 88074 18002f2dc 63 API calls _getptd_noexit 88043->88074 88075 18002f26c 63 API calls _getptd_noexit 88043->88075 88076 18002f28c 63 API calls 2 library calls 88045->88076 88050 180037e93 GetLastError 88046->88050 88046->88051 88047->88043 88050->88051 88051->88043 88051->88046 88052 1800379be WideCharToMultiByte 88052->88043 88054 180037a01 WriteFile 88052->88054 88054->88047 88056 180037a3c 88054->88056 88055 18003ff78 WriteConsoleW CreateFileW _write_nolock 88055->88056 88056->88043 88056->88047 88056->88055 88056->88057 88058 180037a5c WriteFile 88056->88058 88057->88043 88057->88052 88057->88056 88073 180038ddc 63 API calls _LocaleUpdate::_LocaleUpdate 88057->88073 88058->88040 88058->88056 88060 18003ec36 88059->88060 88061 18003ec29 88059->88061 88063 180037870 88060->88063 88089 18002f2dc 63 API calls _getptd_noexit 88060->88089 88088 18002f2dc 63 API calls _getptd_noexit 88061->88088 88063->88043 88072 1800389f4 63 API calls 2 library calls 88063->88072 88065 18003ec6d 88090 180035cb8 12 API calls _invalid_parameter_noinfo 88065->88090 88067->88018 88068->88025 88069->88037 88070->88018 88071->88017 88072->88031 88073->88057 88074->88043 88075->88043 88076->88033 88077->88036 88078->88037 88080 18002cc19 88079->88080 88081 18002cc24 88080->88081 88082 1800357c8 IsProcessorFeaturePresent 88080->88082 88083 1800357df 88082->88083 88091 180032858 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 88083->88091 88085 1800357f2 88092 18003577c SetUnhandledExceptionFilter UnhandledExceptionFilter IsDebuggerPresent _call_reportfault 88085->88092 88088->88063 88089->88065 88090->88063 88091->88085 88093 7ff8a7ac9790 VirtualAlloc 88094 7ff8a7ad5b5d 88093->88094 88094->88094 88095 18002da78 88096 18002db0c 88095->88096 88097 18002da90 88095->88097 88118 180036dc0 DecodePointer 88096->88118 88100 18002dac8 HeapAlloc 88097->88100 88101 18002daa8 88097->88101 88104 18002daf1 88097->88104 88109 18002daf6 88097->88109 88115 180036dc0 DecodePointer 88097->88115 88099 18002db11 88119 18002f2dc 63 API calls _getptd_noexit 88099->88119 88100->88097 88105 18002db01 88100->88105 88101->88100 88112 180036dfc 63 API calls 2 library calls 88101->88112 88113 180036e70 63 API calls 7 library calls 88101->88113 88114 180036898 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 88101->88114 88116 18002f2dc 63 API calls _getptd_noexit 88104->88116 88117 18002f2dc 63 API calls _getptd_noexit 88109->88117 88112->88101 88113->88101 88115->88097 88116->88109 88117->88105 88118->88099 88119->88105 88120 1800354ac 88121 1800354d3 GetLocaleInfoEx 88120->88121 88122 1800354d7 __crtDownlevelLocaleNameToLCID 88120->88122 88123 1800354ec 88121->88123 88124 1800354dc GetLocaleInfoW 88122->88124 88124->88123 88125 18002f10c 88126 18002f128 88125->88126 88130 18002f12d 88125->88130 88139 180039844 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 88126->88139 88128 18002f1b8 88137 18002f182 88128->88137 88188 1800026a0 88128->88188 88130->88128 88130->88137 88140 18002efac 88130->88140 88133 18002f1ff 88134 18002efac _CRT_INIT 107 API calls 88133->88134 88133->88137 88134->88137 88135 1800026a0 _DllMainCRTStartup 180 API calls 88136 18002f1f2 88135->88136 88138 18002efac _CRT_INIT 107 API calls 88136->88138 88138->88133 88139->88130 88141 18002f03b 88140->88141 88142 18002efbe 88140->88142 88144 18002f091 88141->88144 88150 18002f03f _CRT_INIT 88141->88150 88192 180036780 GetProcessHeap 88142->88192 88146 18002f0f4 88144->88146 88147 18002f096 88144->88147 88145 18002efc3 88156 18002efc7 _CRT_INIT 88145->88156 88193 180038b60 68 API calls 7 library calls 88145->88193 88146->88156 88218 1800389b8 63 API calls 2 library calls 88146->88218 88217 180032904 TlsGetValue 88147->88217 88150->88156 88213 1800368b0 65 API calls free 88150->88213 88154 18002efd3 _RTC_Initialize 88154->88156 88161 18002efe3 GetCommandLineA 88154->88161 88155 18002f067 88166 18002f076 _CRT_INIT 88155->88166 88214 18003670c 64 API calls free 88155->88214 88156->88128 88160 18002f071 88215 180038be0 TlsFree _mtterm 88160->88215 88194 1800398f0 GetEnvironmentStringsW 88161->88194 88166->88156 88216 180038be0 TlsFree _mtterm 88166->88216 88173 18002f001 88175 18002f005 88173->88175 88176 18002f00c 88173->88176 88208 180038be0 TlsFree _mtterm 88175->88208 88209 180039454 76 API calls 3 library calls 88176->88209 88180 18002f011 88181 18002f025 88180->88181 88210 180039710 75 API calls 6 library calls 88180->88210 88187 18002f029 88181->88187 88212 18003670c 64 API calls free 88181->88212 88184 18002f01a 88184->88181 88211 180036a30 74 API calls 5 library calls 88184->88211 88185 18002f039 88185->88175 88187->88156 88189 1800026b4 88188->88189 88190 1800026a8 88188->88190 88189->88133 88189->88135 88221 1800026c0 88190->88221 88192->88145 88193->88154 88195 18002eff5 88194->88195 88196 18003991e 88194->88196 88207 1800363dc 67 API calls 5 library calls 88195->88207 88196->88196 88197 18003993b WideCharToMultiByte 88196->88197 88198 1800399be FreeEnvironmentStringsW 88197->88198 88199 18003996d 88197->88199 88198->88195 88219 180031b68 63 API calls malloc 88199->88219 88201 180039975 88201->88198 88202 18003997d WideCharToMultiByte 88201->88202 88203 1800399a5 88202->88203 88204 1800399b0 FreeEnvironmentStringsW 88202->88204 88220 18002d5f4 63 API calls 2 library calls 88203->88220 88204->88195 88206 1800399ad 88206->88204 88207->88173 88209->88180 88210->88184 88211->88181 88212->88185 88213->88155 88214->88160 88218->88156 88219->88201 88220->88206 88273 180002cb0 GetModuleFileNameW 88221->88273 88223 180002709 _wctomb_s_l 88224 18000275b 6 API calls 88223->88224 88283 180005f70 88224->88283 88228 180002843 88291 180005250 161 API calls 2 library calls 88228->88291 88230 180002855 88231 18000287f 88230->88231 88292 1800023f0 65 API calls 2 library calls 88230->88292 88232 180002ac1 88231->88232 88293 180006a80 65 API calls 2 library calls 88231->88293 88309 180005360 90 API calls 2 library calls 88232->88309 88236 180002895 88294 180003260 111 API calls 5 library calls 88236->88294 88237 180002acb 88239 180002af6 88237->88239 88310 1800023f0 65 API calls 2 library calls 88237->88310 88311 1800038d0 90 API calls _RunAllParam 88239->88311 88240 1800028a5 88295 180006db0 99 API calls 3 library calls 88240->88295 88244 1800028bd 88296 180006db0 99 API calls 3 library calls 88244->88296 88245 180002b22 std::ios_base::_Ios_base_dtor 88247 18002cc10 _Mbrtowc 7 API calls 88245->88247 88248 180002b7a 88247->88248 88248->88189 88249 1800028e2 88297 1800062f0 65 API calls 3 library calls 88249->88297 88251 18000292b 88298 180003260 111 API calls 5 library calls 88251->88298 88253 180002939 88299 180006db0 99 API calls 3 library calls 88253->88299 88255 180002951 88300 180006db0 99 API calls 3 library calls 88255->88300 88257 180002999 88301 1800062f0 65 API calls 3 library calls 88257->88301 88259 1800029bf 88302 180003260 111 API calls 5 library calls 88259->88302 88261 1800029cd 88303 180006db0 99 API calls 3 library calls 88261->88303 88263 1800029e5 88304 180006db0 99 API calls 3 library calls 88263->88304 88265 180002a2d 88305 1800062f0 65 API calls 3 library calls 88265->88305 88267 180002a53 88306 180003260 111 API calls 5 library calls 88267->88306 88269 180002a61 88307 180006db0 99 API calls 3 library calls 88269->88307 88271 180002a79 88308 180006db0 99 API calls 3 library calls 88271->88308 88274 180002d06 88273->88274 88275 180002d2e 88273->88275 88312 1800062f0 65 API calls 3 library calls 88274->88312 88313 1800062f0 65 API calls 3 library calls 88275->88313 88278 18002cc10 _Mbrtowc 7 API calls 88279 180002e8a 88278->88279 88279->88223 88280 180002d29 _FXp_movx 88280->88278 88281 180002d79 _DllMainCRTStartup 88281->88280 88314 180003890 65 API calls messages 88281->88314 88315 180002510 70 API calls 3 library calls 88283->88315 88285 180005f8f _DllMainCRTStartup 88316 180006940 99 API calls 6 library calls 88285->88316 88287 180005fb1 88288 180002810 88287->88288 88317 1800023f0 65 API calls 2 library calls 88287->88317 88290 1800051b0 70 API calls _DllMainCRTStartup 88288->88290 88290->88228 88291->88230 88292->88231 88293->88236 88294->88240 88295->88244 88296->88249 88297->88251 88298->88253 88299->88255 88300->88257 88301->88259 88302->88261 88303->88263 88304->88265 88305->88267 88306->88269 88307->88271 88308->88232 88309->88237 88310->88239 88311->88245 88312->88280 88313->88281 88314->88280 88315->88285 88316->88287 88317->88288 88318 1d6c6a50d8f 88319 1d6c6a50d99 88318->88319 88320 1d6c6a50e97 VirtualAlloc 88319->88320 88321 1d6c6a50dfb 88319->88321 88320->88321 88322 1d6c6a50b00 88325 1d6c6a50b1c 88322->88325 88329 1d6c6a50b36 88322->88329 88323 1d6c6a50c3c VirtualAlloc 88324 1d6c6a50cb1 VirtualAlloc 88323->88324 88326 1d6c6a50c6f 88323->88326 88327 1d6c6a50cf3 88324->88327 88324->88329 88325->88323 88325->88329 88326->88324 88326->88329 88328 1d6c6a50e97 VirtualAlloc 88327->88328 88327->88329 88328->88329 88330 180002c30 VirtualAllocExNuma 88331 180002c80 88330->88331 88331->88331

                                              Control-flow Graph

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: +=$,=
                                              • API String ID: 0-3116756818
                                              • Opcode ID: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                                              • Instruction ID: ff46ae8ed18ad4eb2a685835a970e84fc398f12590997750a6080f6d811e0a85
                                              • Opcode Fuzzy Hash: 86d877f4bfbdb9dbd774ef72c11f05b79659dfa0d66e50673e85384098f5fb92
                                              • Instruction Fuzzy Hash: 4D242B52F7569C06EE59C1720AA17FA40C65FB6BE9F64F73AFC0A26BE0D91E54834080

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 9 7ff8a7ac9790-7ff8a7ad5b56 VirtualAlloc 10 7ff8a7ad5b5d-7ff8a7ad5c04 9->10 10->10 11 7ff8a7ad5c0a-7ff8a7ad7afd 10->11
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                                              • Instruction ID: 039fa94fe106eecb8ad3e666d3c5e47ccdc6243e80a86d859cee7c3cc0c1295b
                                              • Opcode Fuzzy Hash: cf5cb5571d315598206a8790c9a41924e950f52808e5ddc8a3697dcb9696509b
                                              • Instruction Fuzzy Hash: 68142B52F7569C06EE59C1720AA17FA80C65FB67E9F64F73AFC0A26BE0DD1E54834080
                                              Memory Dump Source
                                              • Source File: 00000004.00000003.2099458989.000001D6C89A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D6C89A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_3_1d6c89a0000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
                                              • Instruction ID: f561606d4e09c391892503e7dea2cf664831d15274f3beb9d1b44122a519f1b8
                                              • Opcode Fuzzy Hash: d7e753f29fc521fa2d0b6c7a6994e588844e22f1070003091da851a212630d82
                                              • Instruction Fuzzy Hash: 24F0D1B0A28B408BE3449F18848923577E1FB98715F20052FE88987361CB3598428B43
                                              Memory Dump Source
                                              • Source File: 00000004.00000003.2099458989.000001D6C89A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D6C89A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_3_1d6c89a0000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
                                              • Instruction ID: 40776f4ef9c3fb990b405aa523aeb7957367379a431657f3923a4c2e1a27dd5d
                                              • Opcode Fuzzy Hash: c03d8a45eb9b0d3ccc835ff03553e770b46152858ebd01b16508ffef1a6f20c3
                                              • Instruction Fuzzy Hash: FFF05470A24F444BD704AF2C888A67577D1F7A8755F54452FA488C7361DB35E4428B87

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 12 1800026c0-18000280b call 180002cb0 call 18002f4a0 * 3 GetModuleFileNameW SHGetSpecialFolderPathW lstrcatW * 4 call 180005f70 22 180002810-180002858 call 1800051b0 call 180005250 12->22 27 18000285a-180002872 22->27 28 180002880-180002885 22->28 29 180002874 27->29 30 180002877-18000287f call 1800023f0 27->30 31 180002ac1-180002ace call 180005360 28->31 32 18000288b-1800028ab call 180006a80 call 180003260 28->32 29->30 30->28 40 180002af7-180002b5d call 1800038d0 call 180007928 31->40 41 180002ad0-180002ae9 31->41 47 1800028ad 32->47 48 1800028b0-1800028c6 call 180006db0 32->48 55 180002b6b-180002b92 call 18002cc10 40->55 56 180002b5f-180002b66 call 18002e8fc 40->56 43 180002aeb 41->43 44 180002aee-180002af6 call 1800023f0 41->44 43->44 44->40 47->48 57 1800028d1-1800028fa call 180006db0 48->57 58 1800028c8-1800028cc call 18002e8fc 48->58 56->55 65 180002901-18000290c 57->65 66 1800028fc-1800028ff 57->66 58->57 68 180002910-180002919 65->68 67 18000291b-18000293f call 1800062f0 call 180003260 66->67 73 180002941 67->73 74 180002944-18000295a call 180006db0 67->74 68->67 68->68 73->74 77 180002965-18000297d 74->77 78 18000295c-180002960 call 18002e8fc 74->78 80 180002988-1800029d3 call 180006db0 call 1800062f0 call 180003260 77->80 81 18000297f-180002983 call 18002e8fc 77->81 78->77 89 1800029d5 80->89 90 1800029d8-1800029ee call 180006db0 80->90 81->80 89->90 93 1800029f9-180002a11 90->93 94 1800029f0-1800029f4 call 18002e8fc 90->94 96 180002a13-180002a17 call 18002e8fc 93->96 97 180002a1c-180002a67 call 180006db0 call 1800062f0 call 180003260 93->97 94->93 96->97 105 180002a69 97->105 106 180002a6c-180002a82 call 180006db0 97->106 105->106 109 180002a84-180002a88 call 18002e8fc 106->109 110 180002a8d-180002aa5 106->110 109->110 112 180002aa7-180002aab call 18002e8fc 110->112 113 180002ab0-180002abc call 180006db0 110->113 112->113 113->31
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: lstrcat$FileModuleName$FolderIos_base_dtorPathSpecialstd::ios_base::_
                                              • String ID: \NTUSER.DAT.Not$nViewCmd
                                              • API String ID: 2606783807-1926657965
                                              • Opcode ID: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                                              • Instruction ID: 3dd1c745be193ef327f8b6b82ef9b9860cbb876b441ce7f55bb8257e988bbc7a
                                              • Opcode Fuzzy Hash: a946bae1627097ab7b73f61163b0859f0a6ae39e4bd01eb7db3eba8b1cf675f5
                                              • Instruction Fuzzy Hash: 7FE15B32224B8989EBA1DF24D8943DD3761FB897C8F809126F64E47AA9DF74C64DC740

                                              Control-flow Graph

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4530940374.000001D6C6A50000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D6C6A50000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_1d6c6a50000_rundll32.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                                              • Instruction ID: 3fe2732d4675c6ffe5ffbd08d36eef6a507d8037b1addea2ddda49699e376d3a
                                              • Opcode Fuzzy Hash: 7479d515978b8398c8f18a7fbb8c6ce0b9f2a044b6e8d29228c90f9ede51720f
                                              • Instruction Fuzzy Hash: C0E10D30218B489FE794EB58C098B6AB7E0FB9C359F50495EE4CAC7261D774E881CB06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000003.2099458989.000001D6C89A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 000001D6C89A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_3_1d6c89a0000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID: 0-3916222277
                                              • Opcode ID: 493f5e9feb3bc185952b791932f3846df56847a002a59b7567bfb59bfa631270
                                              • Instruction ID: b17d10263b64f393fd009f54148f10ec51794631805174ab5ea2ab2d255807ea
                                              • Opcode Fuzzy Hash: 493f5e9feb3bc185952b791932f3846df56847a002a59b7567bfb59bfa631270
                                              • Instruction Fuzzy Hash: 28B1773121CB088FDB64EF1CD885B9AB7E1FBA8310F51456EE48AC7255DB34E845CB82

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 157 180002c30-180002c79 VirtualAllocExNuma 158 180002c80-180002c98 157->158 158->158 159 180002c9a-180002ca2 158->159
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: AllocNumaVirtual
                                              • String ID: @
                                              • API String ID: 4233825816-2766056989
                                              • Opcode ID: dbe35d2df203950de36ddcf7fe5b798376a89fd65d5bb236196afd6b07239e44
                                              • Instruction ID: 34f6e7e5ba55535552e86dfb8aea1c9c237241a7d285d051a1eb680f4a1854f4
                                              • Opcode Fuzzy Hash: dbe35d2df203950de36ddcf7fe5b798376a89fd65d5bb236196afd6b07239e44
                                              • Instruction Fuzzy Hash: E5F0F03231A1C585E7918B75A811B896EA0A7867A8F698305EB7C427D0DA3D8309CB00

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 576 7ff8a7a844e5-7ff8a7a84533 GetCommandLineW CommandLineToArgvW 577 7ff8a7a84b5b-7ff8a7a84b5e LocalFree 576->577 578 7ff8a7a84539-7ff8a7a8453c 576->578 580 7ff8a7a84b64-7ff8a7a84b8a call 7ff8a7ac5ec0 577->580 579 7ff8a7a84540-7ff8a7a84554 call 7ff8a7ac77d0 578->579 585 7ff8a7a84556-7ff8a7a8455e 579->585 586 7ff8a7a84565-7ff8a7a84567 579->586 585->579 587 7ff8a7a84560 585->587 586->577 588 7ff8a7a8456d-7ff8a7a84575 586->588 587->577 588->577 589 7ff8a7a8457b-7ff8a7a8459a lstrcmpW 588->589 590 7ff8a7a8459c-7ff8a7a845ae lstrcmpW 589->590 591 7ff8a7a845b4-7ff8a7a845d2 GetCurrentProcess IsWow64Process 589->591 590->591 592 7ff8a7a8482a-7ff8a7a8483c lstrcmpW 590->592 593 7ff8a7a84628-7ff8a7a84637 591->593 594 7ff8a7a845d4-7ff8a7a84623 call 7ff8a7ac7a20 call 7ff8a7a6e810 MessageBoxW 591->594 596 7ff8a7a84842-7ff8a7a84846 592->596 597 7ff8a7a84941-7ff8a7a84953 lstrcmpW 592->597 598 7ff8a7a8463d-7ff8a7a8464a 593->598 599 7ff8a7a84822 593->599 594->580 596->597 601 7ff8a7a8484c-7ff8a7a848ac call 7ff8a7ac7a20 call 7ff8a7a8c7b0 596->601 603 7ff8a7a84a4b-7ff8a7a84a5d lstrcmpW 597->603 604 7ff8a7a84959-7ff8a7a8495d 597->604 602 7ff8a7a84650-7ff8a7a84657 598->602 599->592 647 7ff8a7a848ae 601->647 648 7ff8a7a848eb-7ff8a7a8490b call 7ff8a7a84d20 601->648 609 7ff8a7a8480e-7ff8a7a84814 602->609 610 7ff8a7a8465d-7ff8a7a8466c lstrcmpW 602->610 605 7ff8a7a84a5f-7ff8a7a84a63 603->605 606 7ff8a7a84a7a-7ff8a7a84a8c lstrcmpW 603->606 604->603 611 7ff8a7a84963-7ff8a7a8498b call 7ff8a7ac7a20 FindFirstFileW 604->611 605->606 614 7ff8a7a84a65-7ff8a7a84a75 call 7ff8a7a8f7b0 605->614 616 7ff8a7a84a8e-7ff8a7a84aa0 FindWindowW 606->616 617 7ff8a7a84b06-7ff8a7a84b18 lstrcmpW 606->617 609->602 613 7ff8a7a8481a 609->613 619 7ff8a7a8466e-7ff8a7a84676 610->619 620 7ff8a7a8467b-7ff8a7a8468e lstrcmpW 610->620 629 7ff8a7a84a3c-7ff8a7a84a46 call 7ff8a7a8f4b0 611->629 630 7ff8a7a84991-7ff8a7a849bd FindClose call 7ff8a7a8f290 call 7ff8a7ac77d0 611->630 613->599 614->577 626 7ff8a7a84ab5-7ff8a7a84ac8 IsWindow 616->626 627 7ff8a7a84aa2-7ff8a7a84aaf SendMessageW 616->627 617->577 624 7ff8a7a84b1a-7ff8a7a84b25 lstrlenW 617->624 619->609 622 7ff8a7a846b1-7ff8a7a846c4 lstrcmpW 620->622 623 7ff8a7a84690-7ff8a7a846a2 lstrcmpW 620->623 632 7ff8a7a846e7-7ff8a7a846f4 lstrlenW 622->632 633 7ff8a7a846c6-7ff8a7a846d8 lstrcmpW 622->633 623->622 631 7ff8a7a846a4-7ff8a7a846ac 623->631 624->577 634 7ff8a7a84b27-7ff8a7a84b39 lstrcmpW 624->634 636 7ff8a7a84aef-7ff8a7a84b04 call 7ff8a7a8dbe0 SHDeleteKeyW 626->636 637 7ff8a7a84aca-7ff8a7a84aea PostMessageW call 7ff8a7a6e340 626->637 627->626 629->577 672 7ff8a7a849bf-7ff8a7a849c2 630->672 673 7ff8a7a849c4-7ff8a7a84a0a call 7ff8a7ac7a20 GetTempFileNameW call 7ff8a7ac7720 630->673 631->609 632->609 645 7ff8a7a846fa-7ff8a7a8472e 632->645 633->632 642 7ff8a7a846da-7ff8a7a846e2 633->642 643 7ff8a7a84b3b-7ff8a7a84b40 call 7ff8a7a8da00 634->643 644 7ff8a7a84b42-7ff8a7a84b54 lstrcmpW 634->644 636->577 637->636 642->609 643->577 644->577 656 7ff8a7a84b56 call 7ff8a7a8d910 644->656 655 7ff8a7a84730-7ff8a7a8473a 645->655 649 7ff8a7a848b0-7ff8a7a848c3 lstrcmpW 647->649 648->577 667 7ff8a7a84911-7ff8a7a8492d call 7ff8a7a8c7b0 648->667 657 7ff8a7a848c5-7ff8a7a848e9 call 7ff8a7a8c7b0 649->657 658 7ff8a7a84933-7ff8a7a8493c call 7ff8a7a8cd50 649->658 662 7ff8a7a8473c-7ff8a7a84744 655->662 663 7ff8a7a84753-7ff8a7a84780 lstrcmpW 655->663 656->577 657->648 657->649 658->577 662->663 668 7ff8a7a84746-7ff8a7a84751 662->668 663->609 670 7ff8a7a84786-7ff8a7a8479f 663->670 667->577 667->658 668->655 668->663 676 7ff8a7a847a4-7ff8a7a847ae 670->676 677 7ff8a7a84a2e-7ff8a7a84a38 call 7ff8a7ac7720 672->677 692 7ff8a7a84a0c-7ff8a7a84a11 673->692 693 7ff8a7a84a14-7ff8a7a84a27 CopyFileW 673->693 680 7ff8a7a847c7-7ff8a7a847de 676->680 681 7ff8a7a847b0-7ff8a7a847b8 676->681 677->629 683 7ff8a7a847e0-7ff8a7a847f2 680->683 681->680 685 7ff8a7a847ba-7ff8a7a847c5 681->685 683->609 687 7ff8a7a847f4-7ff8a7a8480c call 7ff8a7a84d20 683->687 685->676 685->680 687->609 687->683 692->693 693->677
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: lstrcmp$Message$CloseFileFindPost$CommandLineProcessWindow$ArgvCopyCurrentDeleteFirstFreeLocalNameSendTempWow64lstrlen
                                              • String ID: Error$NVIDIA RTX Desktop Manager$Please use %s to run this command$Software\NVIDIA Corporation\Global\nView$all$apps$desktop$dmflags$help$import$loadprofile$nView64.dll$nViewCmd$off$reset$saveprofile
                                              • API String ID: 845202311-658622161
                                              • Opcode ID: af96e32e7e3f32490f36427dad863ff3c901b93d2b8c288b0a39f5eb28aba3da
                                              • Instruction ID: e2edf42c80c2599bd013be49c66e40f7d2f8907c9665f4a7aa9c5bbf30c60613
                                              • Opcode Fuzzy Hash: af96e32e7e3f32490f36427dad863ff3c901b93d2b8c288b0a39f5eb28aba3da
                                              • Instruction Fuzzy Hash: 8F024B72A1AA82B5FB609F21E8557BD2360FF84BC8F445136DA0E46694EF3CF645E700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: MessageWindow$_invalid_parameter_noinfo_noreturn$CurrentForegroundString$DebugExecuteFindIconicLoadOutputPostProcessSendShellShowThreadlstrlen
                                              • String ID: -NVIDIA RTX / Quadro GPU -NVIDIA display driver -Windows 10 and above$%s\%s$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\API\api.cpp$I$NVIDIA RTX Desktop Manager$NVRunControlPanel$Unsupported OS$Unsupported hardware$launching nViewUI: %s$nvwdmcpl.exe$open
                                              • API String ID: 2858304055-2235191580
                                              • Opcode ID: 3b7aaa0a93482d8f6ad9bb87dc17b7584b97f12eecb72b208f21b382525c2294
                                              • Instruction ID: 57336f390f51edf938fdef9d41690f762a856d03d9996f4b220201d69de46da4
                                              • Opcode Fuzzy Hash: 3b7aaa0a93482d8f6ad9bb87dc17b7584b97f12eecb72b208f21b382525c2294
                                              • Instruction Fuzzy Hash: E1C18D72A0EB86B1EB109F11E4453AE6361FB847D4F400232EA9D47B99EF7CE506D740
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Lockitstd::_$Lockit::_Lockit::~_$GetctypeYarn
                                              • String ID:
                                              • API String ID: 3181430533-0
                                              • Opcode ID: 40d908191ac89458b9bd64ae39b4a4ce898169b569b4ff879f9e6d1f2ef22ad1
                                              • Instruction ID: d8da09ba6319c90b8688c389f4ed05ded6b022904d4a24cead31aebe524b57c8
                                              • Opcode Fuzzy Hash: 40d908191ac89458b9bd64ae39b4a4ce898169b569b4ff879f9e6d1f2ef22ad1
                                              • Instruction Fuzzy Hash: D0E15E72A0BE42B5EB65DF2698411BD33A1EF58BD0F048435EA0D53796EE3CB562A340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _invoke_watson$Locale$SleepUpdateUpdate::___updatetlocinfo__updatetmbcinfo_getptd_malloc_crtmalloc
                                              • String ID:
                                              • API String ID: 3294838543-0
                                              • Opcode ID: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                                              • Instruction ID: 084eb429915106ff2183acdcc5e5956807c1a06688872eada26f31bf39ac8827
                                              • Opcode Fuzzy Hash: 521078f5cd82ac0f084921f5033d007348db3b2902225dc428b05784ca17b11c
                                              • Instruction Fuzzy Hash: C8220332320A4882EBA7DA65E51A3EF2391F7497C4F45D126EF4E8E695DF38D6098300
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Close$Current$HandleOpen$FileInfoProcessQuerySystemThreadUserValueView
                                              • String ID: %s %d$*P$D:\workspace\workspace\nViewBranchBuilder_3S_Agent\sw\nview\v200\nView\SharedData\MemoryManager.cpp$Failed to create shared heap memory.$Failed to map shared heap memory.$ShareHeapMemoryWithProcess$SharedMemorySize$Software\NVIDIA Corporation\Global\nView$nView Shared Memory
                                              • API String ID: 458693518-221517220
                                              • Opcode ID: efb547220dbf658a7d25a490300fb5f43486cdb7a754d46d62a50b696b50be32
                                              • Instruction ID: 01a8f8bea78a7afbb53bca828081d92ce548d58e4a348c723ce3f117fd8b2658
                                              • Opcode Fuzzy Hash: efb547220dbf658a7d25a490300fb5f43486cdb7a754d46d62a50b696b50be32
                                              • Instruction Fuzzy Hash: 5C514F7161AB46A6EB609F10E4413AF73A4FF88780F504136EA8D43B55EF3CE105DB40
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID: $0123456789-
                                              • API String ID: 491317670-700845222
                                              • Opcode ID: bfea4566b3dd4f2453845a7a2c0565e6247bc10b50b38d8d916d4313fb2cf9fb
                                              • Instruction ID: a70e222771d2648924d77d9fb61618b5019d1f7d64ecee5f6b6d25d0e3028cf4
                                              • Opcode Fuzzy Hash: bfea4566b3dd4f2453845a7a2c0565e6247bc10b50b38d8d916d4313fb2cf9fb
                                              • Instruction Fuzzy Hash: 99A26D32704A8885EBA68B65D0503ED27B1FB49BC8F54D016EE4E1BB96DF34CB99D340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID: $0123456789-
                                              • API String ID: 491317670-700845222
                                              • Opcode ID: 7023ceb1d819ec1a1cf44c7629e55f05b0496f09250da5da42953131b9d5b64b
                                              • Instruction ID: 80943f5e6f8277e2c6515c65fe0f4c286d5afc9ab992b988177440c4078c9487
                                              • Opcode Fuzzy Hash: 7023ceb1d819ec1a1cf44c7629e55f05b0496f09250da5da42953131b9d5b64b
                                              • Instruction Fuzzy Hash: 3FA26F32B04A8885EBA68B65D4503ED27B1FB49BC8F54D416FE4E17BA5DF34CA99C300
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID: $0123456789-
                                              • API String ID: 491317670-700845222
                                              • Opcode ID: 5b1f11ae308e5f978eadb6c2e653d3aa161437b62689c1e79878b92cd71a40da
                                              • Instruction ID: 357b8073b20dd1810e5d3b735acf5af2621e0edfda92cd437dcbf710b5a8daa8
                                              • Opcode Fuzzy Hash: 5b1f11ae308e5f978eadb6c2e653d3aa161437b62689c1e79878b92cd71a40da
                                              • Instruction Fuzzy Hash: 10A2C032604A8889FBA7CB65C4503EC27A1F749BC9F94C516EE8A1B7D6CF79C649C304
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: FreeLocal$DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesErrorFileLastMapping
                                              • String ID: S:(ML;;NW;;;LW)
                                              • API String ID: 3392393586-495562761
                                              • Opcode ID: 1bad6f8359a5bfc7530f1a812a5409b517a125bc2b6b65261657b1f3283d3b3c
                                              • Instruction ID: aeb3c17907e520b2668d24caa223f84a7c20e7ba9d750239f939a04c7d561847
                                              • Opcode Fuzzy Hash: 1bad6f8359a5bfc7530f1a812a5409b517a125bc2b6b65261657b1f3283d3b3c
                                              • Instruction Fuzzy Hash: E6516C72B1AB42EAE710CF61E4507AD73B4FB98788F404126EE4D93A58EF78E116D700
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: IntersectRect$_invalid_parameter_noinfo_noreturn$Library$AddressCapsDeviceFreeLoadProcRelease
                                              • String ID:
                                              • API String ID: 4222476805-0
                                              • Opcode ID: 5f2a14ffc23a43a4d15a5f7ab3bf804fe6d62dac530410fa36961198e719c33e
                                              • Instruction ID: 056e7063bf5cb19b3b0506c271963cf921d37e84e2b7226076531b76b06545c6
                                              • Opcode Fuzzy Hash: 5f2a14ffc23a43a4d15a5f7ab3bf804fe6d62dac530410fa36961198e719c33e
                                              • Instruction Fuzzy Hash: B122D272F1A642AAFB008F78D4412BD7361EB597D8F108731DE1D27799EE38B4869740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProcVersion
                                              • String ID: RtlGetVersion$ntdll
                                              • API String ID: 3310240892-2582309562
                                              • Opcode ID: 7606234e096adcee02d3d9db7c79f1b1fc690830e42571d938679808d679138d
                                              • Instruction ID: 1640336ae1b91cc63d09423999d38ea076444a008159083dbc17bc4bc5c6810d
                                              • Opcode Fuzzy Hash: 7606234e096adcee02d3d9db7c79f1b1fc690830e42571d938679808d679138d
                                              • Instruction Fuzzy Hash: 02411D70E0F206FAF7648F50A55233D33A1EF98385F248476D55D466A5FE3DB502AB00
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID:
                                              • API String ID: 491317670-0
                                              • Opcode ID: 32a054681ada761a3f21b934110cbacde2a58451cc4452ceb2e2b32a685144d7
                                              • Instruction ID: ae333f1357bb5ac04765cce638402cad7685101a5c7d4aa2e7d208c612dcf27a
                                              • Opcode Fuzzy Hash: 32a054681ada761a3f21b934110cbacde2a58451cc4452ceb2e2b32a685144d7
                                              • Instruction Fuzzy Hash: 1F32B032604E9885EBA68F25D8453ED63A4F75CBC8F548111FB8957B99EF38CA89C340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID:
                                              • API String ID: 491317670-0
                                              • Opcode ID: d8653a78ccc0500016ee3a39bc8ed8050953f96735a7a63760c9342397005fa0
                                              • Instruction ID: 4647e442d3bcfc851c9f4701ce4f14d67acf718bc96bb144a9f397481643842c
                                              • Opcode Fuzzy Hash: d8653a78ccc0500016ee3a39bc8ed8050953f96735a7a63760c9342397005fa0
                                              • Instruction Fuzzy Hash: 9C32B132604E9886EBA29F25D8453ED63A5F758BC8F54C111FF8957B99EF38C689C300
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct$LockitLockit::_std::_
                                              • String ID:
                                              • API String ID: 491317670-0
                                              • Opcode ID: 72a7ac2e2c1f111e1b61ae734374779d00f08ed685c08311d7ac3453d226d6ed
                                              • Instruction ID: 2589bcd918802237b5c990292f2751727b1abcad383ca43231b0e5c6f6b0472f
                                              • Opcode Fuzzy Hash: 72a7ac2e2c1f111e1b61ae734374779d00f08ed685c08311d7ac3453d226d6ed
                                              • Instruction Fuzzy Hash: 93324E72A04BC885EB678F25C4503ED6761F399BC8F54C112EA8D57BAADF39C689C340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                                              • String ID: 0123456789ABCDEFabcdef-+XxPp
                                              • API String ID: 3643605086-3606100449
                                              • Opcode ID: 94432bfd2f8d95df277d2e9dbc6edac5d8f0baf28bc49a8a7a32c7f5d36230e7
                                              • Instruction ID: 5ab51ccc94a7dab44ec95765bb0b019680b649c223dae5af60e6b35ee96dccf9
                                              • Opcode Fuzzy Hash: 94432bfd2f8d95df277d2e9dbc6edac5d8f0baf28bc49a8a7a32c7f5d36230e7
                                              • Instruction Fuzzy Hash: C8925E37204A88C5EBA68B65C1503FD37A1FB49BC4F54C016EE9A1BBA5DF35CA5AC310
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                                              • String ID: 0123456789ABCDEFabcdef-+XxPp
                                              • API String ID: 3643605086-3606100449
                                              • Opcode ID: 2b3747df4bcc6815d0ca050ff0a1d26fc9399c5a2f48bb3d04cf2418fda5afce
                                              • Instruction ID: 15170c7321f925de93854cd2b60bf2d9794a6949502e19fd89cf563b34aba275
                                              • Opcode Fuzzy Hash: 2b3747df4bcc6815d0ca050ff0a1d26fc9399c5a2f48bb3d04cf2418fda5afce
                                              • Instruction Fuzzy Hash: 46927E37204A88C5EBA68B66D1503FD27A1FB49BC8F54C415EF5A1B7A1CF35CA9AC310
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunctlocaleconv
                                              • String ID: 0123456789ABCDEFabcdef-+XxPp
                                              • API String ID: 3643605086-3606100449
                                              • Opcode ID: ee78207987aaf8e6898c223f5fdc8bfa83aea163ec8c7af802b6eb0c56abaefe
                                              • Instruction ID: 0951dfdd3adb040bfd2425e3f0e5ac157d4fc1802d06d2afbb1654cb7f49c3dd
                                              • Opcode Fuzzy Hash: ee78207987aaf8e6898c223f5fdc8bfa83aea163ec8c7af802b6eb0c56abaefe
                                              • Instruction Fuzzy Hash: A782B4323096888AFBA6CBA581503FD3BA1F74ABC4F54C115EF9907796CF25CA5AC310
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct
                                              • String ID: 0123456789-+Ee
                                              • API String ID: 4240859931-1347306980
                                              • Opcode ID: d972bc5eca4d0b82fe2e94bffa6b7d9434b9e5222b7b794ba326fb571b0aa537
                                              • Instruction ID: 7fa30803b5596d2040c40fa2d6deab6b9b1eebdfa1222772e05d0cd440f79c75
                                              • Opcode Fuzzy Hash: d972bc5eca4d0b82fe2e94bffa6b7d9434b9e5222b7b794ba326fb571b0aa537
                                              • Instruction Fuzzy Hash: E882A032208A8886FBA68B65C1523FD37A1FB49BC4F54C416EF4A17B95DF39CA59C310
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct
                                              • String ID: 0123456789-+Ee
                                              • API String ID: 4240859931-1347306980
                                              • Opcode ID: 821b9d4d01ecd75d4b1e2aa44c8194800fa5c52a50f71f3b929308d42d9b6223
                                              • Instruction ID: 541b46e9ef04b4a6691a8844132f360519d1f98d966391b6e758a932985ee6d9
                                              • Opcode Fuzzy Hash: 821b9d4d01ecd75d4b1e2aa44c8194800fa5c52a50f71f3b929308d42d9b6223
                                              • Instruction Fuzzy Hash: CF829036204A888AFBA68B65C1503FD37A1FB49BC4F54D416EF4A17795EF34CA69C310
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                              • String ID:
                                              • API String ID: 1584724053-0
                                              • Opcode ID: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                              • Instruction ID: 3aca14fc27a6a15d1b1d6d791e791982332b7847b4ff029bd85a204ab66ebf99
                                              • Opcode Fuzzy Hash: bb9541adda1de7d3445963b5d25e419d471c8ff25f1e67a4739099756cf48ec5
                                              • Instruction Fuzzy Hash: A331C53232078885EB97DB26D5093DE7795E789BC4F19C135BE8E4BB9ACE38C1068304
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct
                                              • String ID: 0123456789-+Ee
                                              • API String ID: 4240859931-1347306980
                                              • Opcode ID: e67974f2d9ac711acb042ba2c3b51c72e12c7e8c571ddf96fbd68d540ecca808
                                              • Instruction ID: e252262f3d62f599d6f49dd2fa522cb368fb81fbd5ecc78d30e2ce65ba09eaa7
                                              • Opcode Fuzzy Hash: e67974f2d9ac711acb042ba2c3b51c72e12c7e8c571ddf96fbd68d540ecca808
                                              • Instruction Fuzzy Hash: 9372A23260A68899FB96CBA681503EC3BA1BB49BC8F54C155EF99077D6CF35C65EC300
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn
                                              • String ID: %
                                              • API String ID: 3668304517-2567322570
                                              • Opcode ID: e1c484600b04fc7f895425a5356948795cbabb543350465548e48a692336fa0e
                                              • Instruction ID: 84bb01fbdc3a92aedce0301011095894c098c84f7c2806867e82ba189304888e
                                              • Opcode Fuzzy Hash: e1c484600b04fc7f895425a5356948795cbabb543350465548e48a692336fa0e
                                              • Instruction Fuzzy Hash: 8F123322B09A85AAFB258F65D4513FE67A1EB487C8F448131DE4D97B88EF3CE581D300
                                              APIs
                                              • SetFilePointer.KERNEL32 ref: 00007FF8A7A9683E
                                                • Part of subcall function 00007FF8A7A96460: SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00007FF8A7A96854), ref: 00007FF8A7A96494
                                                • Part of subcall function 00007FF8A7A96460: lstrlenW.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A964AE
                                                • Part of subcall function 00007FF8A7A96460: SetFilePointer.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A964D7
                                                • Part of subcall function 00007FF8A7A96460: ReadFile.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A96518
                                                • Part of subcall function 00007FF8A7A96460: lstrlenW.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A96521
                                                • Part of subcall function 00007FF8A7A96460: lstrcmpW.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A96535
                                                • Part of subcall function 00007FF8A7A96460: SetFilePointer.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A96550
                                                • Part of subcall function 00007FF8A7A96460: SetFilePointer.KERNEL32(?,00007FF8A7A96854), ref: 00007FF8A7A9659C
                                                • Part of subcall function 00007FF8A7A96350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A9638C
                                                • Part of subcall function 00007FF8A7A96350: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A9639E
                                                • Part of subcall function 00007FF8A7A96350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A963BC
                                                • Part of subcall function 00007FF8A7A96350: ReadFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A963E8
                                                • Part of subcall function 00007FF8A7A96350: lstrcmpW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A963FA
                                                • Part of subcall function 00007FF8A7A96350: SetFilePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF8A7A964E8,?,00007FF8A7A96854), ref: 00007FF8A7A96422
                                              • ReadFile.KERNEL32 ref: 00007FF8A7A9689A
                                              • SetFilePointer.KERNEL32 ref: 00007FF8A7A968C3
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: File$Pointer$Readlstrlen$lstrcmp
                                              • String ID:
                                              • API String ID: 75621728-0
                                              • Opcode ID: 4628df762a2c9ad44dbe37110d3e9d88100c24f7c384a6aa602117973b6464b4
                                              • Instruction ID: a27b4c75d621ce3e868bb1c98d1e924f28abba80600b1d213254b37ad8c98d4b
                                              • Opcode Fuzzy Hash: 4628df762a2c9ad44dbe37110d3e9d88100c24f7c384a6aa602117973b6464b4
                                              • Instruction Fuzzy Hash: E0218232A18B8192E710CF21E5517AEB361FBDC7C4F505236EE8D83A15DF39E1958B00
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunct
                                              • String ID: 0123456789ABCDEFabcdef-+Xx
                                              • API String ID: 2786813426-2799312399
                                              • Opcode ID: 310c16e434c6fb425f377aa5a3344d56e60155a5009237bc210dd0dc5f72e661
                                              • Instruction ID: 5fe4dd189a2d79ce61165057c9ebb2e090cd9d14d433b9fec00325c66f72dead
                                              • Opcode Fuzzy Hash: 310c16e434c6fb425f377aa5a3344d56e60155a5009237bc210dd0dc5f72e661
                                              • Instruction Fuzzy Hash: F0129C36704A88C9FBA28F65D0507ED27A1EB49BC9F54C112EE8A1F789DF35CA49C350
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunct
                                              • String ID: 0123456789ABCDEFabcdef-+Xx
                                              • API String ID: 2786813426-2799312399
                                              • Opcode ID: 7f9bde8d58b3e2620bf608a5cc9520c0ecd61f189b4a8a455c5414453c571840
                                              • Instruction ID: 027a829814d0a7af50161521d001647e6a208036f76e6a0cfd0a3acd19813199
                                              • Opcode Fuzzy Hash: 7f9bde8d58b3e2620bf608a5cc9520c0ecd61f189b4a8a455c5414453c571840
                                              • Instruction Fuzzy Hash: 3312C036B04A8885FBA3CB65C4507ED37A1E749BC8F58C016EE4A1B7A5CF35CA49C340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Mpunct
                                              • String ID: 0123456789ABCDEFabcdef-+Xx
                                              • API String ID: 2786813426-2799312399
                                              • Opcode ID: cc0dd99451e0eb2a4836ac02799361a5a9bcabcee1e262923024bb7c99d54d77
                                              • Instruction ID: f7f63c79d1b94fbb45dab63fbf242b30916648d9a31090d02f6495e4854cce8f
                                              • Opcode Fuzzy Hash: cc0dd99451e0eb2a4836ac02799361a5a9bcabcee1e262923024bb7c99d54d77
                                              • Instruction Fuzzy Hash: B9129036708A8889FB92CA75C4503EC3BB1A74ABD8F58C115EE491B796CF75CA4EC350
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct
                                              • String ID:
                                              • API String ID: 4240859931-0
                                              • Opcode ID: 63fef931675e363a9749f96429758758dd3006f32cce81dee63d7a14f1cdfd87
                                              • Instruction ID: b4b31d92be3c4c8e502b6ea2e0a282e668397faed0ae34e767a83c581478e39b
                                              • Opcode Fuzzy Hash: 63fef931675e363a9749f96429758758dd3006f32cce81dee63d7a14f1cdfd87
                                              • Instruction Fuzzy Hash: FBC1A232B06A9899FB52CFB5C4013EC63B1BB5DB88F448111EE4967A99DF39C64EC340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Mpunct
                                              • String ID:
                                              • API String ID: 4240859931-0
                                              • Opcode ID: 9787ca75ca63df748a1499e8dd1c5abcefd6f6751ff6d03e7f7fc609e9ac6cfc
                                              • Instruction ID: 7c40f0623f709e12c7f828199f14d4f1bd29be792234f51f62a64cc8c6a646a4
                                              • Opcode Fuzzy Hash: 9787ca75ca63df748a1499e8dd1c5abcefd6f6751ff6d03e7f7fc609e9ac6cfc
                                              • Instruction Fuzzy Hash: B2C1A332B06E9889FB52CFB5D4017EC63B1BB59788F448511EE4967A89EF38C64EC340
                                              APIs
                                              • EnumSystemLocalesW.KERNEL32(?,?,?,?,00000001800423DB,?,?,00000140,0000000180042AAB), ref: 000000018003541D
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: EnumLocalesSystem
                                              • String ID:
                                              • API String ID: 2099609381-0
                                              • Opcode ID: ef170b939dcdfe0a6fa8f39585badaf32e39fbe27d88ffb3e5b79058c9fef6a5
                                              • Instruction ID: a17f45a68611e7ce09ab532a4d12380a5d0071377e1487d1a7a9af1b51f9b2a3
                                              • Opcode Fuzzy Hash: ef170b939dcdfe0a6fa8f39585badaf32e39fbe27d88ffb3e5b79058c9fef6a5
                                              • Instruction Fuzzy Hash: 5EE0EC35A05A0C81F7C74B12FCD57C623A0A75D3C6FE19601E44C56A70CE7883DD8B00
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionFilterUnhandled
                                              • String ID:
                                              • API String ID: 3192549508-0
                                              • Opcode ID: 8ebd1b43ab214313b2ad0a09dfd0eba3f354677c67a457a5e5e63f9d14e391ab
                                              • Instruction ID: 12656fcb5de8b69835b2dd3a9c331cf0c0323df84e8e99bcec695bc93526836d
                                              • Opcode Fuzzy Hash: 8ebd1b43ab214313b2ad0a09dfd0eba3f354677c67a457a5e5e63f9d14e391ab
                                              • Instruction Fuzzy Hash: 3DC09B33758D0CC2FB6D1BF274953751111D31DB94F0954349D17053508D2C81DD570C
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 254a1a10cbcd3fc84fc19bba0395498d0da72a100f68aacced460330d578e86f
                                              • Instruction ID: 184c9a8fd5ea98e1537e19cc633a410fc6eb720559583607a40148ccf3a74c02
                                              • Opcode Fuzzy Hash: 254a1a10cbcd3fc84fc19bba0395498d0da72a100f68aacced460330d578e86f
                                              • Instruction Fuzzy Hash: 22122B52F7179C06DE19C1720AA57B940C69FB67E9F64BB2AEC0B26BE0C90E50834080
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_
                                              • String ID:
                                              • API String ID: 3382485803-0
                                              • Opcode ID: 11ca8ba6c9e4bc976ad0728efb636439ff8e0f3983e089c52a7ed5c8f874d3e2
                                              • Instruction ID: 84605ef311baa56bc5b68e2491e6a8dcf644c937c9e5222fdf1f18ce1bf163ab
                                              • Opcode Fuzzy Hash: 11ca8ba6c9e4bc976ad0728efb636439ff8e0f3983e089c52a7ed5c8f874d3e2
                                              • Instruction Fuzzy Hash: 0A427A72604A8886FBA68F25D5503BD3361FB89BC8F54D602EF8A17B95DF38C659C300
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_
                                              • String ID:
                                              • API String ID: 3382485803-0
                                              • Opcode ID: de02513275ad1c1a37e0096a818261c58a998aecf4f08ba4a5899afd53db8295
                                              • Instruction ID: 7802ca9db5044afc23cb1f38c8e105cc531337a4395501fdb7ec6a4e23d2f7b6
                                              • Opcode Fuzzy Hash: de02513275ad1c1a37e0096a818261c58a998aecf4f08ba4a5899afd53db8295
                                              • Instruction Fuzzy Hash: 3D427C32604B4886FBA68B25D5803BD7361FB89BC8F54C512EF8A17B96DF39C659C300
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: LockitLockit::_std::_$Stollx
                                              • String ID:
                                              • API String ID: 3628700584-0
                                              • Opcode ID: eb53157097b9bda4a8a3cf500f3039b16533609824c5f9a5ce3e351e3c28d2aa
                                              • Instruction ID: 42b5d6b38fa8120ab5fcb54182bbeb98c0f4066ebeec1de4c937208e3a875605
                                              • Opcode Fuzzy Hash: eb53157097b9bda4a8a3cf500f3039b16533609824c5f9a5ce3e351e3c28d2aa
                                              • Instruction Fuzzy Hash: B8428D72704A8885EBA78B29C5403AD3762FB89BC8F14C616EF9D17796DF39C659C300
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo
                                              • String ID:
                                              • API String ID: 3215553584-0
                                              • Opcode ID: 98797a4ed6df2b2ef2fed60eba7a143dae38721ca92eafd97d56f774b5dbee5b
                                              • Instruction ID: 197bb40f9a3825ce8e585027a62b863a7313ec0efbc04f9a4c076461d3dd3022
                                              • Opcode Fuzzy Hash: 98797a4ed6df2b2ef2fed60eba7a143dae38721ca92eafd97d56f774b5dbee5b
                                              • Instruction Fuzzy Hash: 0971D3B270AA5192EB64CE2AD49137D2360FB84BD8F548636EE2E977C5CF3CD4429740
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 239a3dbec09180cd3c6533b854e040da4f50052b438bebc3e3433ecd8060fee1
                                              • Instruction ID: 3c3f2cb70a9dc206e5dce2d33fc7d033fd7fd3158c1977d8462ff98aa57c4d6f
                                              • Opcode Fuzzy Hash: 239a3dbec09180cd3c6533b854e040da4f50052b438bebc3e3433ecd8060fee1
                                              • Instruction Fuzzy Hash: AF519476B19A65A6E7248F28C04133E23A0EB58B98F348131CE4D07795FB3AF843D740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: _invalid_parameter_noinfo_noreturn$Close$FromOpenQueryStringValue
                                              • String ID: %s %i$($/$Name$SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VirtualDesktops\Desktops
                                              • API String ID: 3244184606-1929885721
                                              • Opcode ID: 42ce07bacc996f2a0b40e488a38c559ebfaeae40b50968b79c9771a6caeb96a5
                                              • Instruction ID: 1cbed3dcb1a74050b07bf98b3ff2d2b95c0b997c629725b650aff9f13269a6a2
                                              • Opcode Fuzzy Hash: 42ce07bacc996f2a0b40e488a38c559ebfaeae40b50968b79c9771a6caeb96a5
                                              • Instruction Fuzzy Hash: 65A1C8B2A1AB81A6EB108F24E44039E77A1FB847E4F505631EA9D07BE9DF7CD045DB04
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: lstrcpy
                                              • String ID: UNKNOWN$WM_ENTERSIZEMOVE$WM_EXITSIZEMOVE$WM_SYSCOMMAND$WM_TWINVIEW$WM_USER
                                              • API String ID: 3722407311-3710089543
                                              • Opcode ID: 3a13069f937072d0b233660105284a1f22af0e500dca7f2205eb1b936971c12f
                                              • Instruction ID: de0dee43757783598f307d3b4616d0c529dc8e16897ad263059f1ae4dbbbaaed
                                              • Opcode Fuzzy Hash: 3a13069f937072d0b233660105284a1f22af0e500dca7f2205eb1b936971c12f
                                              • Instruction Fuzzy Hash: 83214FA1F0B201B7F7588F09E4D92BC2211EF887C1F849036DD4D867A4EE3CB59AA310
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: free$Pointer$DecodeEncodeErrorFreeHeapLast_errno
                                              • String ID:
                                              • API String ID: 4099253644-0
                                              • Opcode ID: c236f47fa00f1eb095f464021b61fc5b1928e1c18c896dc44bc4746b0c097f4e
                                              • Instruction ID: e2653a9f16c68cd9db8ac6c19f3406fb9b710f8bb8de90df47967776b1696018
                                              • Opcode Fuzzy Hash: c236f47fa00f1eb095f464021b61fc5b1928e1c18c896dc44bc4746b0c097f4e
                                              • Instruction Fuzzy Hash: 6B314E31601A4C89FED7DB11E9613E563A0BB4D7D4F19C226BA190AAE5DFBCC68D8301
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: free$setlocalestd::_$Locinfo::_$ErrorFreeGetcvtHeapLastLocinfo_ctorLocinfo_dtorLockitLockit::____lc_codepage_func___lc_locale_name_func___mb_cur_max_func_errno_lock
                                              • String ID:
                                              • API String ID: 3682056076-0
                                              • Opcode ID: ca3fb0b8572f38f04c8e7f887ed93a46820372b37fb06955fdddff351c3b93c0
                                              • Instruction ID: 0d852a346218120d3da4cb41429ba606f2c3b38bf25389faa73f1b0c9af31080
                                              • Opcode Fuzzy Hash: ca3fb0b8572f38f04c8e7f887ed93a46820372b37fb06955fdddff351c3b93c0
                                              • Instruction Fuzzy Hash: 87416B32B45B8889EB52DBB4D4503DC33B9AB687C8F05811AAA4927A9ADE70C659C340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: AddressFreeLibraryProc
                                              • String ID: api-ms-$ext-ms-
                                              • API String ID: 3013587201-537541572
                                              • Opcode ID: 6436c2138278e838b4396a275288fcfbc5b678e40a56344861f9511c4cfbaea8
                                              • Instruction ID: 48fba32acbd3f6f7053a70d83d8afa64e3b4fda3b4b83f2a5cfc954af7aeac87
                                              • Opcode Fuzzy Hash: 6436c2138278e838b4396a275288fcfbc5b678e40a56344861f9511c4cfbaea8
                                              • Instruction Fuzzy Hash: 8041F3B1B1BA02A1EB16DF16A85067D2391FF55BE4F484539CD0D87B94EE3CE406A380
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3320480354-3145022300
                                              • Opcode ID: 1518c0a335d86cbaa4542f68ea49f77159dfa4c437a71da536b0f71a588ef4d3
                                              • Instruction ID: 903a1047ac448027b450ec25c1a64425b0a144e6aa285fcf7086c7a1e7952437
                                              • Opcode Fuzzy Hash: 1518c0a335d86cbaa4542f68ea49f77159dfa4c437a71da536b0f71a588ef4d3
                                              • Instruction Fuzzy Hash: 87313D31604A8881FA97DB15E4503D97761F799BE0F58C222FA6E176E9DF38C68AC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: 72116e41904cd7165d87d3b7b8d6bb6200793e546d858aed617fd641d52c83dc
                                              • Instruction ID: 703a4cad84fdcc045a2871730030fa27516cb42ee1b9283c4040bcabb6153e8b
                                              • Opcode Fuzzy Hash: 72116e41904cd7165d87d3b7b8d6bb6200793e546d858aed617fd641d52c83dc
                                              • Instruction Fuzzy Hash: 50312331604A4881EAA6DB15E4503E97760F798BE4F648322F66D17BE6DF38C68DD700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 6d24588b9a7590b3b87b70300c70b3292790a8bd1c5b1071349b1aa35c1d1e7e
                                              • Instruction ID: ac250751d58bdd5496b533042141eb838cccab87bb5e4a6a326be43682a2c53b
                                              • Opcode Fuzzy Hash: 6d24588b9a7590b3b87b70300c70b3292790a8bd1c5b1071349b1aa35c1d1e7e
                                              • Instruction Fuzzy Hash: F5312E72604A4891EAA6DB15E4407E97760B79CBE0F148322FA6D13BA5DF28C68AD700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 0e8088bbc94c94de44c6ead9a77a8b98552ca770167b247603108ec63001514d
                                              • Instruction ID: 35d3f142cde19c3a048b0fcb9483086a618d1f742b40768914a1a8e34770720a
                                              • Opcode Fuzzy Hash: 0e8088bbc94c94de44c6ead9a77a8b98552ca770167b247603108ec63001514d
                                              • Instruction Fuzzy Hash: 2E314131604B4891FA93DB15E8503D973A5FB987E0F588321FAAD076E5DE38C68E9700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3240839640-3145022300
                                              • Opcode ID: dd54ca0da77a0209b6aeec4e3b00398d8d0106adb950ddbf77bc546178640126
                                              • Instruction ID: c2a974b2d7a60a2b086a420e70802605e61706e16da007e4f81136d50c598c2d
                                              • Opcode Fuzzy Hash: dd54ca0da77a0209b6aeec4e3b00398d8d0106adb950ddbf77bc546178640126
                                              • Instruction Fuzzy Hash: 15316F72605A4C81FAD7DB15E4413D96361F79CBE0F548226FA9D076E5DE38CA8DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: c72775a103d99b6f837bcf2226a3accdb6696da6bb77df867dd2bc43998cf69d
                                              • Instruction ID: 32bc1acb226f066091d62a6c54883872f8d60ae5ef2b5e81e47e51f18fae378c
                                              • Opcode Fuzzy Hash: c72775a103d99b6f837bcf2226a3accdb6696da6bb77df867dd2bc43998cf69d
                                              • Instruction Fuzzy Hash: 62314F32604A8881FAD6DB15E4403D97761F79DBE0F148222F66D636E5DE38C78DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: db4531463fb4ed7b9e84e20dd1357846afa3d7ca33d6adf5fa5f8d6b27529a5f
                                              • Instruction ID: b0aa7ca52775649b56220f307fd84676fe4e09e30895342a551203fcddcd03a4
                                              • Opcode Fuzzy Hash: db4531463fb4ed7b9e84e20dd1357846afa3d7ca33d6adf5fa5f8d6b27529a5f
                                              • Instruction Fuzzy Hash: 67313036604A4881EAA6DB15E4503E97760F79C7E0F548322FA6D03BE9DE38C68EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 4068408745-3145022300
                                              • Opcode ID: ee33bc0723efa5aa4c366d82e68c788871106819f50c989c870ed83f44bc0ef7
                                              • Instruction ID: 0ed4759d308908f78153d5154aa8bc73361bf9988d8352dbe00c3883d08f4416
                                              • Opcode Fuzzy Hash: ee33bc0723efa5aa4c366d82e68c788871106819f50c989c870ed83f44bc0ef7
                                              • Instruction Fuzzy Hash: 84315271704B4881EAA2DB15E4407E97760E79DBE4F148221FA6D17BE9DF38C68EC701
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 0d872b1ba248602230f18a3585586ef29a0b918caca146d4684eaa2802e5b407
                                              • Instruction ID: ba173e527248ad616717990ad57c3ea3ffa836c4fcce1a36eb2f310dd1d629a6
                                              • Opcode Fuzzy Hash: 0d872b1ba248602230f18a3585586ef29a0b918caca146d4684eaa2802e5b407
                                              • Instruction Fuzzy Hash: A5313E31605F4881EA92DB15E4443D977A1FB98BE0F548221FAAD176E9DF38C68ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 6042c083aaf9d19d0e0f3061719a0287c51729f22326b78e9f0788faf9e04fe2
                                              • Instruction ID: 8bbbb137a0339c4dc54c9029d106e5257286d05d285556903a5a2b1fb779c90b
                                              • Opcode Fuzzy Hash: 6042c083aaf9d19d0e0f3061719a0287c51729f22326b78e9f0788faf9e04fe2
                                              • Instruction Fuzzy Hash: 88316171604A4881EA97DB15E4513D96760F79CBE0F148322F76D136E5DF38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 32b660dc0e0ff8b2840d4f21ec67105e4c0f753b12f06fb9ea139e048b570729
                                              • Instruction ID: 0e6cdc202ab0faf405a73aae82ebcdbb06b13299b5b79274f84cc1b9637a6d3e
                                              • Opcode Fuzzy Hash: 32b660dc0e0ff8b2840d4f21ec67105e4c0f753b12f06fb9ea139e048b570729
                                              • Instruction Fuzzy Hash: 0C315071704B8881FA96DB15E4403DA7361F79DBE0F148222BA6E176E5DF38D68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: 5c641469a2d30daa8160390feef35362dee9b3f3e43551c59d405e4c7c364bf2
                                              • Instruction ID: 85f0ddc1fb455183e8826907cb9b5ce322fb28c6acbd3a1f7897a95eead57acb
                                              • Opcode Fuzzy Hash: 5c641469a2d30daa8160390feef35362dee9b3f3e43551c59d405e4c7c364bf2
                                              • Instruction Fuzzy Hash: 89313032604A4882EAA6DB15E4503E97361E798BE0F548221FA6D437E5DF78C78E9700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 4068408745-3145022300
                                              • Opcode ID: ae0ea46a9ee9c3e86daeac0d3234f15b2964b553704b4edd4ab6e31ed39ad8f6
                                              • Instruction ID: 29293d91807841274312c0898b4eab7eb0361c7ebc024cff1c6093db3a856592
                                              • Opcode Fuzzy Hash: ae0ea46a9ee9c3e86daeac0d3234f15b2964b553704b4edd4ab6e31ed39ad8f6
                                              • Instruction Fuzzy Hash: 7E313071604A4881FAA7DB15E4507E97361E79CBE0F148221FA6E137E9DF38C68ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 4068408745-3145022300
                                              • Opcode ID: c202a5770c39ab57ed84ceb3e68100b3a73b5e5cfc957b9efda8ad8bf9c3945a
                                              • Instruction ID: 93b7f2e2961d43802aa01675c6e34dc0c733fb271d42efec73ddf7d9136c2f33
                                              • Opcode Fuzzy Hash: c202a5770c39ab57ed84ceb3e68100b3a73b5e5cfc957b9efda8ad8bf9c3945a
                                              • Instruction Fuzzy Hash: F2314F31605A4881FA96DB15E4507DA77A1FB98BE0F148321FAAE036E5DE38C78ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 7c5417a85a408d482a06928c82b709df55114473f0ba7bb4651cdaf59540ff60
                                              • Instruction ID: 75f7d5b72cde2ed98477708e3d1a4d82b3ea81c6c5906bfc7a9d9a34f9766923
                                              • Opcode Fuzzy Hash: 7c5417a85a408d482a06928c82b709df55114473f0ba7bb4651cdaf59540ff60
                                              • Instruction Fuzzy Hash: 0E315071604A4C81FAA7DB15E4513E96760F79CBE0F64C322BA5E176E5DE38C68EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 51d939a1685a2bea652c7bde2fffae8489b2ff6d25f45c1629a8571a2a082665
                                              • Instruction ID: 011b7c4e06debffad8918965d35e9ac5ee19e89f5e81af284a0d200ba2a5a2d3
                                              • Opcode Fuzzy Hash: 51d939a1685a2bea652c7bde2fffae8489b2ff6d25f45c1629a8571a2a082665
                                              • Instruction Fuzzy Hash: 96316132604A8C81FA96DB15E4407D97761F799BE0F14C222FA6E236E5DF39C68EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: 13f34df5b8dca6365bf56936fc197be976fcfd57eef588af3eb235ac7314212c
                                              • Instruction ID: af194abc5343017d69ccae0d00c3f84e880894c87c78bc69f84cbf70def1933b
                                              • Opcode Fuzzy Hash: 13f34df5b8dca6365bf56936fc197be976fcfd57eef588af3eb235ac7314212c
                                              • Instruction Fuzzy Hash: 45314331604A4881EAA6DB15E4503EA7760F79CBE4F548222FA6D177E5DF38C68ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcodecvtstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 2666907392-3145022300
                                              • Opcode ID: c388285eeef8162b9337bba61029a55adadbbccc6a3321af76d71b019ff4cab9
                                              • Instruction ID: 9f8509df617fee80e8d8dfa9a623ec6440d9e8a68142cbaf352e872acf36d8d2
                                              • Opcode Fuzzy Hash: c388285eeef8162b9337bba61029a55adadbbccc6a3321af76d71b019ff4cab9
                                              • Instruction Fuzzy Hash: 18316131604E8881EA97DB15E8403D97761E79DBE4F548222FAAD136E5DE38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 480e9808ded4dd9ce93b9611af4d871cbfd108c73a0c2514d78019fd0e2b9d8d
                                              • Instruction ID: d9abbdc1c59c89ecb922db9c6cf2075237f80f35d562cec5bde8faddb7bf7778
                                              • Opcode Fuzzy Hash: 480e9808ded4dd9ce93b9611af4d871cbfd108c73a0c2514d78019fd0e2b9d8d
                                              • Instruction Fuzzy Hash: A5315271604A4881EAA3DB15F4413D96761F79CBE0F548322FA6D076E9DF38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: cc7960cd80689731206c88487c0de69d9e60d2192e2557925d807d75d2f5c5e1
                                              • Instruction ID: 7e9a7ef3db8d0513497969ea559276415be1bfe1d386d7b59b03975b12a9fb17
                                              • Opcode Fuzzy Hash: cc7960cd80689731206c88487c0de69d9e60d2192e2557925d807d75d2f5c5e1
                                              • Instruction Fuzzy Hash: 7D316F32604A8882EA96DB15E8503D97761F798BE0F64C322FA6D176E5DF38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 3587b487d705abe092835c4f5a3cb7e3f979531b66054bbeb9aa7d553986a25e
                                              • Instruction ID: 6d09809d2825c675cc3354ec29be6d882d9351c6da2981936af5edb680e291e5
                                              • Opcode Fuzzy Hash: 3587b487d705abe092835c4f5a3cb7e3f979531b66054bbeb9aa7d553986a25e
                                              • Instruction Fuzzy Hash: 7A316132604B4881EAA6DB15E8403E97760F79CBE0F548222FA5D037E9DF39C68ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3240839640-3145022300
                                              • Opcode ID: eda171fb9a849b4f616c3e08da64b58d4c66e3ddf2523fe25397e19311bc49a1
                                              • Instruction ID: 71537928979aec7902da3243a871980667c4c30672dd1b9dca4b0184ee6d3b67
                                              • Opcode Fuzzy Hash: eda171fb9a849b4f616c3e08da64b58d4c66e3ddf2523fe25397e19311bc49a1
                                              • Instruction Fuzzy Hash: 36313E72605A8881FA96DB15E4403D97361F7A9BE0F188222FA6D636E5DF39C68D8700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: 6d32b28b6ca3663ff3abfb41e9471f4c917f2c1054da530c376a0520937a3486
                                              • Instruction ID: b60f097be7739bb6dc934a6eb27d4ad299f47afb1e08747a93c7bf12596e6123
                                              • Opcode Fuzzy Hash: 6d32b28b6ca3663ff3abfb41e9471f4c917f2c1054da530c376a0520937a3486
                                              • Instruction Fuzzy Hash: 7F316C72604A4981EE93DB19E4513D96760F79CBE0F158322BA6E076E5DF38CA8EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 9a938acf533d3934332a6247e24f5e54ece76f8414f260b4929eae246823290b
                                              • Instruction ID: 114c17726efd3ac1399dd98c0993eddc8de426ae5a52da213f0347ec5244437b
                                              • Opcode Fuzzy Hash: 9a938acf533d3934332a6247e24f5e54ece76f8414f260b4929eae246823290b
                                              • Instruction Fuzzy Hash: 55314132604B8C81EA96DB15E8403D97761F79DBE0F14C222F66D236E6DE38CA8DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 96317be4258d393e0a29fd177015503871ef1b8472f330f26a4596696f7ded08
                                              • Instruction ID: d5a0afbf97bf32ff6c3350b5f01d45652f3842558bd94ec47325ba3e195b39a4
                                              • Opcode Fuzzy Hash: 96317be4258d393e0a29fd177015503871ef1b8472f330f26a4596696f7ded08
                                              • Instruction Fuzzy Hash: E0314132604A4C91EAA7DB15E4503E97760F7987E0F148222F6AD13BE9DF39C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: e5bc7bed0252b8b1eac2afdacdede538a10b35561d0a981faa6039916fcc0b90
                                              • Instruction ID: fcae424b2c24524ac6a2dc0f7b7d658d6964671266eecf1fc0c25137e3d741c2
                                              • Opcode Fuzzy Hash: e5bc7bed0252b8b1eac2afdacdede538a10b35561d0a981faa6039916fcc0b90
                                              • Instruction Fuzzy Hash: 77313E31704B4981EA93DB15E4407E97361E7AC7E0F18C321FA6D176E6DE38CA8E8700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockcollatestd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3240839640-3145022300
                                              • Opcode ID: 82d6dfd595e0919862318aaa4c0101f1d4fe4afb7754d539f957bde6888f6d2a
                                              • Instruction ID: f8ae8055f2c2bb27548f621051a3e9b0c7ecbe39d78b1a5e4a20972fbb614263
                                              • Opcode Fuzzy Hash: 82d6dfd595e0919862318aaa4c0101f1d4fe4afb7754d539f957bde6888f6d2a
                                              • Instruction Fuzzy Hash: 14313272608A8881FA96DB25E8403D97761F79DBE0F548322F66D176E5DF38C68EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmoneypunctstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3809448442-3145022300
                                              • Opcode ID: 468e8583f91d548cbd29b93b68de9fe69da34fbf07c94fac8ff66319a34d3499
                                              • Instruction ID: 86d7a962d46641e92d15d66fca1501ef3728ada81f482cdfd9b3151a9865967a
                                              • Opcode Fuzzy Hash: 468e8583f91d548cbd29b93b68de9fe69da34fbf07c94fac8ff66319a34d3499
                                              • Instruction Fuzzy Hash: 7F316F72A04A4C81FAD7DB15E5413D96361F79CBE0F148222FA5D076E5DE38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: a97d4a0103f654b4b20c800e4f62322db3453708dd72828d55e479ce89410c5e
                                              • Instruction ID: f3f19d9c217fac931ce927225a4939fad5f6d9221ff3f3f816bb9e389d9f9663
                                              • Opcode Fuzzy Hash: a97d4a0103f654b4b20c800e4f62322db3453708dd72828d55e479ce89410c5e
                                              • Instruction Fuzzy Hash: 7C316171604B4D81FA96DB15E4403E97761E79CBE0F64C222BA6E177E6DE38CA8DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 620047600-3145022300
                                              • Opcode ID: 8e5fefe93561a59ad46ce85a37caf660d85c16939c4905db0fbb578ad49114bb
                                              • Instruction ID: 96f0fb2c830b6a1955649fbd0b773edd4971c9b10982643f56ec6eb2397e4fe1
                                              • Opcode Fuzzy Hash: 8e5fefe93561a59ad46ce85a37caf660d85c16939c4905db0fbb578ad49114bb
                                              • Instruction Fuzzy Hash: A5313F32604B4881EAA6DB15E4403E97760F798BE4F64C322BA5D037E9DF38C68ED700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 3320480354-3145022300
                                              • Opcode ID: 917c673cf237d7768db5174921dcc6ae41103a5902e4674f2ebf9e3ddd9a3165
                                              • Instruction ID: 2949d1dbb2558bb8b0e553727a052f62747b73423eec58154c0806c570db14de
                                              • Opcode Fuzzy Hash: 917c673cf237d7768db5174921dcc6ae41103a5902e4674f2ebf9e3ddd9a3165
                                              • Instruction Fuzzy Hash: 70311D31604A4C81EA97DB15E8513D977A1FB98BE0F148322FAAD076E5DF39C68E9700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast$ios_base::badbit set
                                              • API String ID: 1776536810-182444483
                                              • Opcode ID: 1f1de01e030e88115448670c1250ec0f749da08e23ff95ccc15e6e7bba8c242b
                                              • Instruction ID: 3155b743d34470ed5679d7b64c3638ca01dfa7372a6c5b669332cd991d85d7a9
                                              • Opcode Fuzzy Hash: 1f1de01e030e88115448670c1250ec0f749da08e23ff95ccc15e6e7bba8c242b
                                              • Instruction Fuzzy Hash: FD315D35600B4881EA97DB15E5403D97361E798BE0F58D222FA6E177F9DE38C68EC701
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: free$Sleep_malloc_crtmalloc
                                              • String ID:
                                              • API String ID: 2523592665-0
                                              • Opcode ID: 3fbd0b3e35addabc098f64ab091990d7b6a2871f8ac9e4cce4e35d3e8861d74a
                                              • Instruction ID: fc16e1660138297f9bb3e8678e6c16cd315b57137c63fc5872edf9e7c8194a9d
                                              • Opcode Fuzzy Hash: 3fbd0b3e35addabc098f64ab091990d7b6a2871f8ac9e4cce4e35d3e8861d74a
                                              • Instruction Fuzzy Hash: 30619F32301B4892EBA3DB16E94139A73A0F78CBD8F058125AF4D47B51DF78C66AC740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrowstd::exception::exception$Xbad_allocstd::_
                                              • String ID: bad conversion$string too long
                                              • API String ID: 1519488521-500853860
                                              • Opcode ID: bf6df7041d4449f49d10bdcf2d7bbb40e5c4d876ee2b76c3840bffa6f91f8fdb
                                              • Instruction ID: fad14312ad47d1d51249c0a7a389eb41bb91f270e5ec6e02dd255712d111446d
                                              • Opcode Fuzzy Hash: bf6df7041d4449f49d10bdcf2d7bbb40e5c4d876ee2b76c3840bffa6f91f8fdb
                                              • Instruction Fuzzy Hash: D4D17B32704B88C9FB42CBA4E4503ED37B5F7497A8F948626EAA917AD5DF34C649C340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
                                              • String ID:
                                              • API String ID: 1573762532-0
                                              • Opcode ID: 7b47a042eea3f3de49294c888d2e7f7195dfd9dc128bccc2e4caf73cebc8c57f
                                              • Instruction ID: f2ef72c2d081a62da6ba206108f7190fcdc76fe894ca0d405d2fc84784ff5a10
                                              • Opcode Fuzzy Hash: 7b47a042eea3f3de49294c888d2e7f7195dfd9dc128bccc2e4caf73cebc8c57f
                                              • Instruction Fuzzy Hash: 50411677A01A9D81EBE69B1191C03F972A0F7487DDF9AC116FA845B6C4DF38C7498308
                                              APIs
                                              • RegOpenKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A7A744C5), ref: 00007FF8A7A7451F
                                                • Part of subcall function 00007FF8A7A861F0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A7A8621E
                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF8A7A744C5), ref: 00007FF8A7A74672
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: GridCount$R%d$rcMonitorX$rcMonitorY
                                              • API String ID: 3677997916-3195266059
                                              • Opcode ID: d4954fe01bd13cc0e09b9bb97f1a492d31920e10008184fdca9963bf8f21c4a9
                                              • Instruction ID: 48ebe890409910e37052cb512d6e5b96d43919d0f62fcfec8cf65c0ac5023f9d
                                              • Opcode Fuzzy Hash: d4954fe01bd13cc0e09b9bb97f1a492d31920e10008184fdca9963bf8f21c4a9
                                              • Instruction Fuzzy Hash: 0B51C572A1E691B6EA508F15F45127EB7A0FB88BC0F405136EA8E87B56EF3CE011D740
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
                                              • String ID:
                                              • API String ID: 781512312-0
                                              • Opcode ID: 1996f2f9ceac77ac49b72366ba56ab82fbc49c57b1b3130c14664040d3ec86e6
                                              • Instruction ID: 8ce04cb9124dd54c6d4ddcc2c6da84841e497bcc28cebf8c8d46b4611f73f4df
                                              • Opcode Fuzzy Hash: 1996f2f9ceac77ac49b72366ba56ab82fbc49c57b1b3130c14664040d3ec86e6
                                              • Instruction Fuzzy Hash: 28415B72A106E881EBE3AB1180513FE33E0E359BE4F96C225B794076C5EF28CB59C700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: ab939dc476349fa0fdaab308a684cfe4368de580aaf06aec8b938b68da6e425a
                                              • Instruction ID: e37e8b3caca8d6a150532a67f206124a5a8e0b77ae31ba5b87879bce6c6f3b3a
                                              • Opcode Fuzzy Hash: ab939dc476349fa0fdaab308a684cfe4368de580aaf06aec8b938b68da6e425a
                                              • Instruction Fuzzy Hash: E5314172604A4981EA97DB15E4907D97760E79CBE0F548222BA6D0B7E9DE38C6CDC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: 10cc8910cc85584bd4a3460428c8224b28d9867b334426348c47967f8e79c69e
                                              • Instruction ID: 5280669f5cee9c1c10b6307b5616e8497b2b20f45e6c0148fb90ff969be6db11
                                              • Opcode Fuzzy Hash: 10cc8910cc85584bd4a3460428c8224b28d9867b334426348c47967f8e79c69e
                                              • Instruction Fuzzy Hash: AD315432604A4881EA97DB15E4403D96761F7987E0F549322FA5E576E5DF38CA8DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: 62fdf57a96092745c62a34c7ea652cdc8cbd8a8d616748e806eab291326f5f4d
                                              • Instruction ID: 651fb656c3f290362de763b1ee359234d87ce794770dba1f6b2753c03b7c62f2
                                              • Opcode Fuzzy Hash: 62fdf57a96092745c62a34c7ea652cdc8cbd8a8d616748e806eab291326f5f4d
                                              • Instruction Fuzzy Hash: 3F315232604A4D81FAA6DB15E5417E97361F7987E0F148222BA6D077E5DF38CA8EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: e9c222ff3a7390eeb7995fd0964985c14573391c4c93fb8924965464058be729
                                              • Instruction ID: 6ee744d50b30d82c78f3f63e2e17a70b14ef85af489d316716f56745e473c8ac
                                              • Opcode Fuzzy Hash: e9c222ff3a7390eeb7995fd0964985c14573391c4c93fb8924965464058be729
                                              • Instruction Fuzzy Hash: 50315232604A4C85EAA2DB15E8403E97761F79CBE0F548222F65D077E6DF38C68DC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: 7ebc46492d4dac5414eace0dc4bc23cdeb242ea3acaa4deefd90ef76b8116496
                                              • Instruction ID: ec51a6cea0b166713f805a236551c1283cd08e0c28255429b56f9ce5f8cbadc2
                                              • Opcode Fuzzy Hash: 7ebc46492d4dac5414eace0dc4bc23cdeb242ea3acaa4deefd90ef76b8116496
                                              • Instruction Fuzzy Hash: 76316132604B4981EAA6DB15E4407E97760F799BE4F648231F66D077E5DE38C78EC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: 9261657b17084aba6423a854777eb8a9a4c09b6e3969408025c508acd221764b
                                              • Instruction ID: ba7f2a953198e62413a15f720fea67b0a98ff4fd57fa2979048f6802ea0a1aa0
                                              • Opcode Fuzzy Hash: 9261657b17084aba6423a854777eb8a9a4c09b6e3969408025c508acd221764b
                                              • Instruction Fuzzy Hash: 0D313031604E4882FB97DB15E8403D96361F79CBE0F288322B69D176E5DE79DA8EC700
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Open$Close$CurrentQueryUserValue
                                              • String ID:
                                              • API String ID: 384383028-0
                                              • Opcode ID: 604bbfb0ae1169e5cea77c79d2654ac51a876ae21c04f2b2698c331749a0c9d9
                                              • Instruction ID: 5f718d7388a56574beab7db0557f429031fcc63fbc9cff0ecc431807e3b88925
                                              • Opcode Fuzzy Hash: 604bbfb0ae1169e5cea77c79d2654ac51a876ae21c04f2b2698c331749a0c9d9
                                              • Instruction Fuzzy Hash: E1318BB261AB81A2EB508F16F44472EB7A0FB887D4F444132EA8E43B68DF7CD055DB00
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockstd::bad_exception::bad_exception
                                              • String ID: bad cast
                                              • API String ID: 1776536810-3145022300
                                              • Opcode ID: 0ac0953fd19857d648c264f06a73748a9098f24d820f7a16771c37c3a699e4c5
                                              • Instruction ID: 5c309b77fee12f51d110db927d2fe456d8342975b36495e84ceae0cc68268f47
                                              • Opcode Fuzzy Hash: 0ac0953fd19857d648c264f06a73748a9098f24d820f7a16771c37c3a699e4c5
                                              • Instruction Fuzzy Hash: 33315031700A4881FA96DB15E4407D97761E7A8BE0F58C321FA6D036E6DE38C68EC740
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                              • String ID:
                                              • API String ID: 3191669884-0
                                              • Opcode ID: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                              • Instruction ID: 4b6da2c887b896db48c8bf2af78125f2489fc4292198535c1cc227c838a58a5b
                                              • Opcode Fuzzy Hash: ec2a6dd435b50d5e993b3328a406cbf0fc12b9938289ae1a38fd3c4af6446b14
                                              • Instruction Fuzzy Hash: 2B31CC72704B888AE6A39B5190847EDB7A4F348BE4F668125FE5803B96CF74CA49C704
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 432778473-1866435925
                                              • Opcode ID: c4755da1f0456530d0fa2dca688d121101a445544884d577615891b101f1b86f
                                              • Instruction ID: a05f63984e831ba9eb21b9b46173f67e56e275c27f518e2d554fe2b11f73e329
                                              • Opcode Fuzzy Hash: c4755da1f0456530d0fa2dca688d121101a445544884d577615891b101f1b86f
                                              • Instruction Fuzzy Hash: 80215E71A11B5D99FB92DB64E8813EC3374B718388F908126F94922A69EF35C74EC340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: free$ErrorFreeHeapLastLocinfo::_Locinfo_dtor_errnosetlocalestd::_
                                              • String ID:
                                              • API String ID: 1855319098-0
                                              • Opcode ID: 2f9469f7e86d9ed662453ed7390a40d8cb98c28b94d45fdd9a0046f49d435607
                                              • Instruction ID: b48272a0fe48caf80c68cbfff6fe37b1983f1ac57bfd09bfec3c9c3905106cea
                                              • Opcode Fuzzy Hash: 2f9469f7e86d9ed662453ed7390a40d8cb98c28b94d45fdd9a0046f49d435607
                                              • Instruction Fuzzy Hash: 85010831202A9888EF9FDF65D5917EC73A4EF59FC8F188116BA4906A86CE64CD94C740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _getptd
                                              • String ID: MOC$RCC$csm
                                              • API String ID: 3186804695-2671469338
                                              • Opcode ID: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                              • Instruction ID: cee1693f68b0781dadb7962070319637af549046bf3e62ebc375f9a8a227fa41
                                              • Opcode Fuzzy Hash: 79c6bdfdf6facc246eee842b2de7a644aa034f1ac0e2309a20206dc5bd345c8d
                                              • Instruction Fuzzy Hash: 6DF0303550814CCAE6DB2B5484053FF2790EB9DB87F8BC1A2A30082382CFBC47989B57
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow$LockitLockit::_std::_
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 1691487403-1866435925
                                              • Opcode ID: 0db30ec67b73ccdcabdd15c275040f157008ca9554cbf0563cdfb27b905dc0a0
                                              • Instruction ID: 767f78a192eeebaa216b8aed547a68a7fb289aba9e2ffc4a09429269e94dafed
                                              • Opcode Fuzzy Hash: 0db30ec67b73ccdcabdd15c275040f157008ca9554cbf0563cdfb27b905dc0a0
                                              • Instruction Fuzzy Hash: 22C17372600B49C5EBA6CF19E0903A9B7A1F788BD4F50C522EB4D437A5DF7AC64AC740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 432778473-1866435925
                                              • Opcode ID: 8d1da8b0088b82ce8472ecfb309f3f6d6294f4c20df7e85d44d77dd3078eb974
                                              • Instruction ID: a8b4bdf90a1f4ad9093596da8dc1c2238f82fb5394a2230a05445288838e8596
                                              • Opcode Fuzzy Hash: 8d1da8b0088b82ce8472ecfb309f3f6d6294f4c20df7e85d44d77dd3078eb974
                                              • Instruction Fuzzy Hash: B2A15672605B4885EBA6CF19D0903AD77A1F788BC4F50C512EA8E437B5DF3AC68AC700
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 432778473-1866435925
                                              • Opcode ID: 13b14e47e50a117b45a7778c449b81f96b46451b12d824cac215d1e20a6c26ef
                                              • Instruction ID: 749b6e3399a9a358d8b44ea8bf4972b4671ad478281f1e69b97e26da144d3d08
                                              • Opcode Fuzzy Hash: 13b14e47e50a117b45a7778c449b81f96b46451b12d824cac215d1e20a6c26ef
                                              • Instruction Fuzzy Hash: DF316472604A4891EAA2DB08E4913D973A0F79C7C4F508522F68D53AA6DF3DC74EC740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ExceptionThrow
                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                              • API String ID: 432778473-1866435925
                                              • Opcode ID: 9c7b1aa60feacb23789e46315638fef29d19575f7816bd3068f614c3fe862f5d
                                              • Instruction ID: c8b34f633450288d0747754450d333132d257ba904ae0c0c3cccce57b6605a3c
                                              • Opcode Fuzzy Hash: 9c7b1aa60feacb23789e46315638fef29d19575f7816bd3068f614c3fe862f5d
                                              • Instruction Fuzzy Hash: EE316172615B8891EAA2CB14E4913D973A1F78C7C4F908522FA8D53B65DF39C74EC740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task
                                              • String ID: false$true
                                              • API String ID: 118556049-2658103896
                                              • Opcode ID: 14bcb6fc04d6207312ac0b71193f476d97310ba2fc694dbaca6b0e73206cd48f
                                              • Instruction ID: 22cfc734f4c0f6df97a93cc97bee08810e4e8617cc7748fb1481e5504bbb75ee
                                              • Opcode Fuzzy Hash: 14bcb6fc04d6207312ac0b71193f476d97310ba2fc694dbaca6b0e73206cd48f
                                              • Instruction Fuzzy Hash: C9919D22B1AB86AAE710DF61D4412AD33B5FB48788F454235DE4C97B89EF38E516D340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: fgetwc
                                              • String ID: string too long
                                              • API String ID: 2948136663-2556327735
                                              • Opcode ID: 2c54e6a053e8696a3d6b4ce687133d9b1274fd72c1f8f27c02397be768dd15f8
                                              • Instruction ID: e9e8eae9dbfed57877077c82a3db96da082da43fa004c8d24fdad90a2db03b72
                                              • Opcode Fuzzy Hash: 2c54e6a053e8696a3d6b4ce687133d9b1274fd72c1f8f27c02397be768dd15f8
                                              • Instruction Fuzzy Hash: 00912873700A89D9EB62CF25C4903EC33A5F758798F918622EB1D47A99DF35CA68C314
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Value$CloseEnumOpenQuery
                                              • String ID: Disable_
                                              • API String ID: 2924656870-3431196049
                                              • Opcode ID: 909549ab4e45b6006d3222f2beee845314a71683d74e0daf326a2a6027938a8b
                                              • Instruction ID: ae895ca0f8def84c450f0b6528dc724e6e07bb91ee42051cbbe7b3d7422bf62c
                                              • Opcode Fuzzy Hash: 909549ab4e45b6006d3222f2beee845314a71683d74e0daf326a2a6027938a8b
                                              • Instruction Fuzzy Hash: D9717D36A0AB81AAE7109F25E4412AFB7B4FB84788F104035EB8D43B54EF7CE555DB44
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                              • String ID: :
                                              • API String ID: 1584724053-336475711
                                              • Opcode ID: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                                              • Instruction ID: 6d0e94c2461dd84b0edd1b1838a9f5cfcbcc86ad0ff0a6976e9d1f2ec4836e13
                                              • Opcode Fuzzy Hash: 604a302fabdb042f4ebc9b27cedb385bdeaebfe8a2c90ea295b00d5b5a1e0000
                                              • Instruction Fuzzy Hash: 5C41D032320B4881EB46DF26A8053DE63A5FB88BC4F4AD025EF5D4B785DE38D616C304
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                              • String ID: :
                                              • API String ID: 1584724053-336475711
                                              • Opcode ID: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                              • Instruction ID: 3ed635f29bcd3bbc21113fbea3335e451753d90b531e1a175994c922d52f3f57
                                              • Opcode Fuzzy Hash: f6eab2cf8d0451a383fcd1094c8bc586515c01fa06371aa533fca521f759249e
                                              • Instruction Fuzzy Hash: 8441E03232074881EB46EF26A4453DE63A5FB49BC4F4AD025EF5D47785DE38D61AC304
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _getptd$ExceptionRaise_amsg_exit_getptd_noexit
                                              • String ID: csm
                                              • API String ID: 2951875022-1018135373
                                              • Opcode ID: 19bc60ab7c8d46f879a577fdbd2134b4bea23403eb8b854014e227e093e25ad5
                                              • Instruction ID: cbf58d6bb5dae3ded25f47af1c64b690f48564a0522dc2334fd63855ea109656
                                              • Opcode Fuzzy Hash: 19bc60ab7c8d46f879a577fdbd2134b4bea23403eb8b854014e227e093e25ad5
                                              • Instruction Fuzzy Hash: D52101362046888AE6B2DF56E0407EFB760F78DBA5F058216EF9943795CF38D689C701
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseFileHandleMappingOpen
                                              • String ID: %s %d$*P$nView Shared Memory
                                              • API String ID: 890169576-673546495
                                              • Opcode ID: 6687ec36b3b96fc96f6e99804bb1c58a7ae370612d08be84a3efe426ee0ca8dc
                                              • Instruction ID: 61954a6c133effaa4a9cd043e08b05cef3aaed6a23f8611a34e7bc60e908715d
                                              • Opcode Fuzzy Hash: 6687ec36b3b96fc96f6e99804bb1c58a7ae370612d08be84a3efe426ee0ca8dc
                                              • Instruction Fuzzy Hash: 6D018475B1AA81B1FB60EF50E45A3BE6350FFC8785FC04032D65D42755EE3CE106AA00
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
                                              • String ID:
                                              • API String ID: 2998201375-0
                                              • Opcode ID: ce750271998e25300b2e646f02fc7aaebec70d68116cdf7c58e233941e4e38ee
                                              • Instruction ID: 54a50374dbd1f0619f5f0edc3d7c0374764c2683045a736cdbb11a7d2bf11c8c
                                              • Opcode Fuzzy Hash: ce750271998e25300b2e646f02fc7aaebec70d68116cdf7c58e233941e4e38ee
                                              • Instruction Fuzzy Hash: D841E53221578486E7A38F15E1403AAB7A1FF99FC0F199165FB8857BD9CF38C6458700
                                              APIs
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A7A7064B), ref: 00007FF8A7A86666
                                              • GetSecurityDescriptorSacl.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A7A7064B), ref: 00007FF8A7A8668F
                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A7A7064B), ref: 00007FF8A7A86697
                                              • SetSecurityInfo.ADVAPI32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A7A7064B), ref: 00007FF8A7A866C4
                                              • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,00007FF8A7A7064B), ref: 00007FF8A7A866D1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: ErrorLastSecurity$DescriptorFreeInfoLocalSacl
                                              • String ID:
                                              • API String ID: 770883003-0
                                              • Opcode ID: 26d171845e726335711b201ca163724500d896e7f63c1369cf58c7af46724ff1
                                              • Instruction ID: 1db37017830bbbcd1331111f69adb6250378694c7477806d90f743808296f218
                                              • Opcode Fuzzy Hash: 26d171845e726335711b201ca163724500d896e7f63c1369cf58c7af46724ff1
                                              • Instruction Fuzzy Hash: 7B119D72A0AB8696E7109FA1F84469D73A1FB88790F044136EB8C83B14DF38D8069B00
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _getptd$_inconsistency$DecodePointer_amsg_exit_getptd_noexit
                                              • String ID:
                                              • API String ID: 3669027769-0
                                              • Opcode ID: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                              • Instruction ID: 484109b601cdb60bdd28eb5de1a6cf464c0836e84c8d7e2c0ed591a5095a7b89
                                              • Opcode Fuzzy Hash: d84545b744132abf258f2739307021ab7867776e2950de2c885c0764620f8872
                                              • Instruction Fuzzy Hash: E5F0FE322086CCC1EAE7AB55D2413FD5350AB8DBC4F1DC171BB840738B9E20C6989315
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: string too long
                                              • API String ID: 0-2556327735
                                              • Opcode ID: 4bcb7b9e46f5ff7cc52432c6c311dcb44bcc844c052dc368eac45e35e3a37bff
                                              • Instruction ID: 445ab153e7c438d5d2aafa17d0e773ba3e554981103aaf2981c75933f28ac080
                                              • Opcode Fuzzy Hash: 4bcb7b9e46f5ff7cc52432c6c311dcb44bcc844c052dc368eac45e35e3a37bff
                                              • Instruction Fuzzy Hash: D0919D72310B8899EB56CF66C0417EC33A5F319B98F818922EB5D67B99DF34CA59C310
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: P
                                              • API String ID: 0-3110715001
                                              • Opcode ID: e760891b3d0586f10b0c45491ee25524a262a87b45dc8837c1d53ab325d03245
                                              • Instruction ID: b61560cea917720c2c694f6aec2bd663e9b9141b50d631c9c2fd6ec482dbf2a3
                                              • Opcode Fuzzy Hash: e760891b3d0586f10b0c45491ee25524a262a87b45dc8837c1d53ab325d03245
                                              • Instruction Fuzzy Hash: 8E315B3261AB81EAF3609F15F44176EB3A4FB88780F544135EA8947B94EF3CE4159F40
                                              APIs
                                              • _callnewh.LIBCMT ref: 000000018002EF4E
                                              • malloc.LIBCMT ref: 000000018002EF5A
                                                • Part of subcall function 000000018002DA78: _FF_MSGBANNER.LIBCMT ref: 000000018002DAA8
                                                • Part of subcall function 000000018002DA78: _NMSG_WRITE.LIBCMT ref: 000000018002DAB2
                                                • Part of subcall function 000000018002DA78: HeapAlloc.KERNEL32(?,?,00000000,000000018002CDB6,?,?,00000001,000000018002CCA4,?,?,?,0000000180007B34), ref: 000000018002DACD
                                                • Part of subcall function 000000018002DA78: _callnewh.LIBCMT ref: 000000018002DAE6
                                                • Part of subcall function 000000018002DA78: _errno.LIBCMT ref: 000000018002DAF1
                                                • Part of subcall function 000000018002DA78: _errno.LIBCMT ref: 000000018002DAFC
                                              • _CxxThrowException.LIBCMT ref: 000000018002EFA3
                                                • Part of subcall function 000000018002F788: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180007B51), ref: 000000018002F7F6
                                                • Part of subcall function 000000018002F788: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,0000000180007B51), ref: 000000018002F835
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
                                              • String ID: bad allocation
                                              • API String ID: 1214304046-2104205924
                                              • Opcode ID: 738ca98c6a90698db2108c0c022190bcd32b331751dc6fe347bc8814740b5120
                                              • Instruction ID: c34e540c3145ef8f8a06282e5f5fd2721dda0450d804faa98ee3730b4d12842b
                                              • Opcode Fuzzy Hash: 738ca98c6a90698db2108c0c022190bcd32b331751dc6fe347bc8814740b5120
                                              • Instruction Fuzzy Hash: 3AF09AB1605B8E80EEA79B50A0517E95394E78D3C8F488025FA8D0B7A6EE39C34DCB01
                                              APIs
                                                • Part of subcall function 00007FF8A7A94530: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A7A94570
                                                • Part of subcall function 00007FF8A7A94530: RegQueryValueExW.ADVAPI32 ref: 00007FF8A7A945AE
                                                • Part of subcall function 00007FF8A7A94530: RegCloseKey.ADVAPI32 ref: 00007FF8A7A945D0
                                                • Part of subcall function 00007FF8A7A94530: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A7A945FE
                                                • Part of subcall function 00007FF8A7A948B0: RegOpenKeyExW.ADVAPI32 ref: 00007FF8A7A94928
                                                • Part of subcall function 00007FF8A7A948B0: RegEnumValueW.ADVAPI32 ref: 00007FF8A7A94962
                                                • Part of subcall function 00007FF8A7A948B0: RegQueryValueExW.ADVAPI32 ref: 00007FF8A7A949C1
                                                • Part of subcall function 00007FF8A7A948B0: RegCloseKey.ADVAPI32 ref: 00007FF8A7A94ADA
                                              • RegCloseKey.ADVAPI32 ref: 00007FF8A7A948A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: CloseOpenValue$Query$Enum
                                              • String ID: Hotkeys$Software\NVIDIA Corporation\Global\nView$SystemSubMenu
                                              • API String ID: 920421334-3017348070
                                              • Opcode ID: 582784c8c46b6a3e45548c249fc6da8832204fb5b35df2e6620f96a5510e8c89
                                              • Instruction ID: d9bb663298b51bc4d12cdd4702d9084378c247d0d16f160a751aab7ffa6085d6
                                              • Opcode Fuzzy Hash: 582784c8c46b6a3e45548c249fc6da8832204fb5b35df2e6620f96a5510e8c89
                                              • Instruction Fuzzy Hash: CCF037B192AA87B0EA009F52F8813AE6720EB957C4F402031FA4F47765EE2CE156D740
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: strcspn$Mpunctlocaleconv
                                              • String ID:
                                              • API String ID: 2882554788-0
                                              • Opcode ID: 58ecd130f00b09f8bef17f7d97753f2651f40aaaca60dedd1df9ae10203089cb
                                              • Instruction ID: 98907bd55804cf440550a9984b5626c23124420e0867e0600be7f70ad20b48f8
                                              • Opcode Fuzzy Hash: 58ecd130f00b09f8bef17f7d97753f2651f40aaaca60dedd1df9ae10203089cb
                                              • Instruction Fuzzy Hash: DFE18E32B04E8889EB529F65C4413ED63B1FB4CB88F658115EE8D57B99DF78C64AC340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: strcspn$Mpunctlocaleconv
                                              • String ID:
                                              • API String ID: 2882554788-0
                                              • Opcode ID: 224329cea580c2bc9a473805bd80dcfbc8fe358384d0317fe36835c614ca270f
                                              • Instruction ID: 0755191b1818215e47aef75f24144b8be0e7d395005ccb8dbfd754ea295aee4c
                                              • Opcode Fuzzy Hash: 224329cea580c2bc9a473805bd80dcfbc8fe358384d0317fe36835c614ca270f
                                              • Instruction Fuzzy Hash: 44E18E32B04E8889FB529FA5C4513ED63B1FB58B88F648115EE8D57B99DF78C24AC340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: strcspn$Mpunctlocaleconv
                                              • String ID:
                                              • API String ID: 2882554788-0
                                              • Opcode ID: fce10359bc36b8c483969d2f07a480db227c72c73635d2d78eb5f884875fabf2
                                              • Instruction ID: 7cedfd9f43536d940008849a18cc50f9a484f0cb7e860469d92b1f85863b93e9
                                              • Opcode Fuzzy Hash: fce10359bc36b8c483969d2f07a480db227c72c73635d2d78eb5f884875fabf2
                                              • Instruction Fuzzy Hash: 9DD15B32B05A8889EB52CBB5D4503DD37B1F749BC8F949115EE8967B8ADF38C24AC740
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale_invoke_watson$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_call_reportfault_getptd_malloc_crt
                                              • String ID:
                                              • API String ID: 1584724053-0
                                              • Opcode ID: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                                              • Instruction ID: 60c5c1db5c3b6a439df75705f13e8ee1368a37c7c8ec72173617ca3056aafd03
                                              • Opcode Fuzzy Hash: 3daca0f6dc92f9794fddbcc1cdaa0d0f178e51dead4e14673644e8c31eb13f91
                                              • Instruction Fuzzy Hash: F231C57271064886EB57DB26941539E67A1E789FC4F05C135EF5D0BB9ACF38D2068304
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _wfsopen$fclosefseek
                                              • String ID:
                                              • API String ID: 1261181034-0
                                              • Opcode ID: 060668c88b56fe38f5c44a18ba7740774a474d3c0946bdb231730e3168279bf2
                                              • Instruction ID: ca7f0c424757e16301a012df31de7f28ede8ce03464d2c668ee3546fdfd8efa6
                                              • Opcode Fuzzy Hash: 060668c88b56fe38f5c44a18ba7740774a474d3c0946bdb231730e3168279bf2
                                              • Instruction Fuzzy Hash: 6921E5327216C885FBE6CB1AD441BE67691A78CBC4F19C134BE0943B95DE35C60A8341
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                              • String ID:
                                              • API String ID: 4151157258-0
                                              • Opcode ID: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                              • Instruction ID: 9616a423f97e3a452b980222ce2d2f9dcf0e870d32183e3c52a82e7da15984e5
                                              • Opcode Fuzzy Hash: eb64e8c74a50022202f8ee626fe7dbe8f97126340f84a3ce38f6fe5f0cae3986
                                              • Instruction Fuzzy Hash: D0213872204AAC40F7E75E1194D03FD66C0EB88FDAF1AC824FAC6076C5CD28C749A708
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: AddfacLocimp::_Locimp_LockitLockit::__lockfreemallocstd::_std::locale::_
                                              • String ID:
                                              • API String ID: 2732429687-0
                                              • Opcode ID: 4c7c4e4cdeb69145b53e9993b344bfcc5c5a1a68407a660adf776166b3026ff4
                                              • Instruction ID: 76cda7fa5ebd9028eb80fcaf77cbf10d53a700b3cb3c5ee5f831434e332e8d90
                                              • Opcode Fuzzy Hash: 4c7c4e4cdeb69145b53e9993b344bfcc5c5a1a68407a660adf776166b3026ff4
                                              • Instruction Fuzzy Hash: 84213B71604A8881EBA2CF11E4403DAB3A0F7597E0F548216EB9D57BA6CF7CC6998740
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                              • String ID: ios_base::failbit set
                                              • API String ID: 73155330-3924258884
                                              • Opcode ID: 9b6c570c9035688cfefed480fd4f4d797140a035135655b89860c2973c60c9fc
                                              • Instruction ID: 390bf1dc20ed344c6c7f2300f0bd00a6940195edb11e625855d31228c9e26edf
                                              • Opcode Fuzzy Hash: 9b6c570c9035688cfefed480fd4f4d797140a035135655b89860c2973c60c9fc
                                              • Instruction Fuzzy Hash: B291DF23A0AB85A2EA14CF15F54127E6760FB48BD4F198635EEAD07791EF3CE891D340
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Concurrency::cancel_current_taskDisplayEnumMonitorsRelease_invalid_parameter_noinfo_noreturn
                                              • String ID: vector too long
                                              • API String ID: 3103344671-2873823879
                                              • Opcode ID: 00b5893f6815dd50e256614d8bc03589ac8b3f58f2ac44a187f63c999bb3d69f
                                              • Instruction ID: 3d333214ae42a71ebfba171d8ae5db498ea1af8310905e68c955c88bbfecd974
                                              • Opcode Fuzzy Hash: 00b5893f6815dd50e256614d8bc03589ac8b3f58f2ac44a187f63c999bb3d69f
                                              • Instruction Fuzzy Hash: 8351C2B2B0AA42B5EA20EF15E4512BD6360FF48BE8F448631DA5D437DADF3CE4429300
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: Getvals
                                              • String ID: false$true
                                              • API String ID: 1336808981-2658103896
                                              • Opcode ID: fcaa8dee8702df954b53bf384bd75b2644456ebc9bdddcb28530bd4f0760cdf8
                                              • Instruction ID: be48f438c6565521ba65a7b8984fa30f49def0ef234a77fca77d028af2f69fb5
                                              • Opcode Fuzzy Hash: fcaa8dee8702df954b53bf384bd75b2644456ebc9bdddcb28530bd4f0760cdf8
                                              • Instruction Fuzzy Hash: 9F415B32B09B41A9F710CF70E4411ED33B1FB98788B545226EE4E27A59EF38E696D344
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID: NVIEW PROFILE LOCK
                                              • API String ID: 2738559852-3082433184
                                              • Opcode ID: ab27f8d0231a89b0cb702682be9596c8e9e922d8ba3a70dd5091fb8da4012714
                                              • Instruction ID: ce3bf8c443b3a4254031c1dd25370180558fdf37bcef73aa5425d143e60e39ef
                                              • Opcode Fuzzy Hash: ab27f8d0231a89b0cb702682be9596c8e9e922d8ba3a70dd5091fb8da4012714
                                              • Instruction Fuzzy Hash: 73318D63919BC192E7608F24E4143BEB360FBE9794F409326EB9C02699EF7CD194CB00
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _getptd
                                              • String ID: csm$csm
                                              • API String ID: 3186804695-3733052814
                                              • Opcode ID: ce9d772766a9f3e407c5664677aefc26ffad84ba179c49f55fff2b9c6189d35d
                                              • Instruction ID: f7e595c495de74603a87214bb7ed729c6939f290df5d238fa3d8429b20b6b438
                                              • Opcode Fuzzy Hash: ce9d772766a9f3e407c5664677aefc26ffad84ba179c49f55fff2b9c6189d35d
                                              • Instruction Fuzzy Hash: 6031A773101B48CADBA18F66C0843993BB5F358B9DF8B5225FA4D1BB64CB75C984C788
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
                                              • String ID: bad locale name
                                              • API String ID: 1838369231-1405518554
                                              • Opcode ID: c524e6af0baa67fe1cc82a5cd4aa5f82788b02c5eb321f0c46adb42b5351efdd
                                              • Instruction ID: 0283a57625a02ef9b4cbb1bce82799a2c68448af2fca1e1eb6ba4d76b986aa2f
                                              • Opcode Fuzzy Hash: c524e6af0baa67fe1cc82a5cd4aa5f82788b02c5eb321f0c46adb42b5351efdd
                                              • Instruction Fuzzy Hash: D301A223506B8099C345DF74A84115C77B5FB58BC4B185139CA8C8374AFF38D4A0C354
                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4529786912.0000000180001000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000000180000000, based on PE: true
                                              • Associated: 00000004.00000002.4529767390.0000000180000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529820139.000000018004A000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529839842.0000000180060000.00000004.00001000.00020000.00000000.sdmpDownload File
                                              • Associated: 00000004.00000002.4529872462.00000001800A3000.00000002.00001000.00020000.00000000.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_180000000_rundll32.jbxd
                                              Similarity
                                              • API ID: _getptd$_inconsistency
                                              • String ID: csm
                                              • API String ID: 1773999731-1018135373
                                              • Opcode ID: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                              • Instruction ID: 6596bc08887fd2df5714e5c2ca6ea54ff60e088d84c846dd7f248314ba4ebb2f
                                              • Opcode Fuzzy Hash: 242ad1541a1665e7e88aaf19789ec1deda19dbf05a08f0dcd3087e0f0a85a81f
                                              • Instruction Fuzzy Hash: 8D01A736115A4989DBA2AF71D4C17FD2394E7497C9F099171FE4946349DE20C6C9C340
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.4531864440.00007FF8A7A01000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8A7A00000, based on PE: true
                                              • Associated: 00000004.00000002.4531850228.00007FF8A7A00000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4531968624.00007FF8A7B70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532004019.00007FF8A7BC4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532018219.00007FF8A7BC6000.00000008.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532031749.00007FF8A7BC7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000004.00000002.4532046182.00007FF8A7BCE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_7ff8a7a00000_rundll32.jbxd
                                              Similarity
                                              • API ID: ErrorLast$FreeLocal
                                              • String ID:
                                              • API String ID: 1627422176-0
                                              • Opcode ID: 45d03da843b7eb71680eb8731c5b4906c31a2aa6ec7f343a47b717000f953ddf
                                              • Instruction ID: 94268db3ac13c6e4503cde7b364252068efe59ad5ca511f7e31eb6978d928740
                                              • Opcode Fuzzy Hash: 45d03da843b7eb71680eb8731c5b4906c31a2aa6ec7f343a47b717000f953ddf
                                              • Instruction Fuzzy Hash: 5A21D471F1E58291EB548F26A50457D5250EF88BD0F486231EE5F477D5DE3CE882A740